old  ethics and information security ( correlates to chapter 3 and 4) practice quiz

1.
Ethics is a branch of philosophy that deals with what is considered to be right and wrong.
A. True
B. False


2.
Past court decisions have stated that privacy must be balanced against the needs of society.
A. True
B. False


3.
The law basically does not support an employer's right to read electronic mail and other electronic documents.
A. True
B. False


4.
Information about individuals is kept in numerous databases in numerous organizations.
A. True
B. False


5.
Privacy regulations are basically the same from country to country around the world.
A. True
B. False


6.
As computing devices become available to more people internationally, this leads to decreases in the threats to information security.
A. True
B. False


7.
Industrial espionage is an unintentional threat to information resources.
A. True
B. False


8.
In some countries of the world, more than 85 percent of all software consists of illegal copies.
A. True
B. False


9.
Cookies can be used to invade your privacy.
A. True
B. False


10.
A recovery plan to keep a business running after a disaster is called business continuity.
A. True
B. False


11.
Ethical issues may be categorized into which of the following types?
A.
privacy
B.
accuracy
C.
property
D.
accessibility
E.
all of the above


12.
Computer code that performs malicious actions and can replicate without the presence of another computer program is a:
A.
virus
B.
worm
C.
zero-day attack
D.
back door
E.
logic bomb


13.
Computers that have been turned into zombies, or bots, are most closely associated with what kind of attack?
A.
worm attack
B.
virus attack
C.
denial-of-service attack
D.
distributed denial-of-service attack
E.
phishing attack


14.
Defending information resources is not a simple or inexpensive task for which of the following reasons?
A.
hundreds of potential threats exist
B.
computing resources are located in many locations
C.
untrusted computer networks are linked to your corporate network
D.
rapid technological changes can make some controls obsolete as soon as they are implemented
E.
all of the above


15.
Effective passwords have all of the following characteristics except they:
A.
should be difficult to guess.
B.
should contain no special characters so that it can be remembered easily.
C.
should not be a recognizable word.
D.
should be longer rather than shorter.
E.
should not be a recognizable string of numbers.



STOP This is the end of the test. When you have completed all the questions and reviewed your answers, press the button below to grade the test.

Hit Counter