
Ethics, Law, and Information Security Worksheet
Authored by simar kaur
Computers
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best highlights three differences between good conduct and good ethics?
Conduct is about actions; ethics are about values. Conduct is seen by others; ethics are internal. Conduct can vary; ethics are more consistent.
Conduct is unethical; ethics are illegal. Conduct is internal; ethics are external. Ethics depend on popularity.
Conduct and ethics are the same in all cases.
Conduct is emotional; ethics are physical. Conduct affects law; ethics do not. Ethics are always visible.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can the USA PATRIOT Act affect businesses using U.S.-based hosting services?
It requires all foreign businesses to pay extra taxes to the U.S.
It allows U.S. authorities to access data stored by U.S. companies, even if the data belongs to foreign clients.
It bans non-U.S. companies from using American cloud services.
It ensures data hosted in the U.S. is protected from any government access.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not one of the 10 basic principles of the CSA Code for the protection of personal information?
A. Accountability
B. Consent
C. Unlimited Collection
D. Identifying Purposes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Effective ways to add character diversity to a password include which of the following?
Using a mix of uppercase, lowercase, numbers, and symbols
Repeating the same character multiple times
Using only lowercase letters
Using only numbers
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are good practices for creating a strong password?
Use a mix of uppercase and lowercase letters
Include numbers and special characters (e.g., @, #, !)
Repeat the same word multiple times
Replace some letters with symbols (e.g., “a” with “@”)
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are acceptable forms of preventing hacking?
Double encryption
Prevent root access
Think like a thief
Trick your users to give info
Run server processes such as web or database as root
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The United States does not have any privacy legislation in place.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?