Cybersecurity Ethics

Cybersecurity Ethics

10th Grade - University

10 Qs

quiz-placeholder

Similar activities

Vocabulary of Computer

Vocabulary of Computer

12th Grade

15 Qs

Sprawdź się

Sprawdź się

4th - 12th Grade

10 Qs

Q1 M 2 - TOPIC 2 / Check your understanding

Q1 M 2 - TOPIC 2 / Check your understanding

10th Grade

10 Qs

Computational Thinking in Python[Quiz 3]

Computational Thinking in Python[Quiz 3]

University

15 Qs

LET's Check your knowledge on E-Governance & E-Commerce

LET's Check your knowledge on E-Governance & E-Commerce

10th Grade

11 Qs

JRB2 Quiz 4

JRB2 Quiz 4

University

10 Qs

Pandas - CSV file

Pandas - CSV file

12th Grade

10 Qs

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

University

10 Qs

Cybersecurity Ethics

Cybersecurity Ethics

Assessment

Quiz

Computers

10th Grade - University

Hard

Created by

Reiner Dizon-Paradis

Used 165+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

How do you unlock a circuit that is protected using Hardware Obfuscation or Sequential Locking?

providing the ciphertext

using a sequence of key bits that loads one by one

loading all the key bits into the locking gates

testing out all combinations

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is the simplest approach to Hardware Obfuscation?

adding encryption engine that implements AES

adding flip-flops (and states to the FSM)

inserting a hardware trojan

adding XOR/XNOR gates

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What are examples of harms to privacy?

placement of flip-flops

identity theft, blackmail, extortion

locking a computer system

misappropriate electronic funds

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What are examples of harms to property?

misappropriate electronic funds

steal valuable intellectual property

act of god

indemnification

adding countermeasures

extending encryption

protecting intellectual property

securing hardware systems

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

In terms of Transparency & Disclosure, what is the ethical duty of a cybersecurity professional?

withhold information from all those affected

consider the cost of cybersecurity within the organization

disclose risks, when known, to those affected

remotely cause damage or destruction

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is one question to ask when considering Threat or Incident Response?

Have we prepared for the worst scenario?

What encryption do we use?

Have we struck a balance and all agree on it?

How do we securely store information?

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is one question to ask when considering Network Monitoring?

What are the gray areas in our responses?

What do we do if agencies told us to weaken encryption?

What do we do if we’re told to violate our duty?

How do we monitor our network without intruding on our users?

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?