Cybersecurity Ethics

Cybersecurity Ethics

10th Grade - University

10 Qs

quiz-placeholder

Similar activities

NMT21403 - Introduction to cybersecurity

NMT21403 - Introduction to cybersecurity

University

8 Qs

4.4 Prevention methods

4.4 Prevention methods

9th - 11th Grade

10 Qs

OSINT

OSINT

University

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

File Encryption Quiz

File Encryption Quiz

12th Grade

15 Qs

Introduction to I.T. Essentials

Introduction to I.T. Essentials

9th - 12th Grade

12 Qs

PTLW Final Exam Review Part 3

PTLW Final Exam Review Part 3

9th - 12th Grade

10 Qs

Cybersecurity Ethics

Cybersecurity Ethics

Assessment

Quiz

Computers

10th Grade - University

Hard

Created by

Reiner Dizon-Paradis

Used 164+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

How do you unlock a circuit that is protected using Hardware Obfuscation or Sequential Locking?

providing the ciphertext

using a sequence of key bits that loads one by one

loading all the key bits into the locking gates

testing out all combinations

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is the simplest approach to Hardware Obfuscation?

adding encryption engine that implements AES

adding flip-flops (and states to the FSM)

inserting a hardware trojan

adding XOR/XNOR gates

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What are examples of harms to privacy?

placement of flip-flops

identity theft, blackmail, extortion

locking a computer system

misappropriate electronic funds

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What are examples of harms to property?

misappropriate electronic funds

steal valuable intellectual property

act of god

indemnification

adding countermeasures

extending encryption

protecting intellectual property

securing hardware systems

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

In terms of Transparency & Disclosure, what is the ethical duty of a cybersecurity professional?

withhold information from all those affected

consider the cost of cybersecurity within the organization

disclose risks, when known, to those affected

remotely cause damage or destruction

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is one question to ask when considering Threat or Incident Response?

Have we prepared for the worst scenario?

What encryption do we use?

Have we struck a balance and all agree on it?

How do we securely store information?

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

What is one question to ask when considering Network Monitoring?

What are the gray areas in our responses?

What do we do if agencies told us to weaken encryption?

What do we do if we’re told to violate our duty?

How do we monitor our network without intruding on our users?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?