ITE6202 Social and Professional Issues
Even with long years of experience,
skills based on shallow knowledge of the field could be damaging to the
profession |
True |
A man who did
something to help others but it is against his will is not considered good.
This is an example of _________. |
Deontology |
Ethical decision
making is the process of making a decision which may result in one or more
moral conflicts while ethical reasoning is when ethical principles is
integrated in the reasoning process |
True |
Professional Codes
of Conduct addresses the following except: |
Confidentiality and Commitment |
It is when laws are
used to resolve interpersonal conflicts in a society. |
Conflict Resolution |
Morality is
enforced by the authority that enacted them and security forces |
False |
Which is true about
Licensing Authorities.
I. Before a license
is issued an individual must be tested. II. Violation of
the rules from the licensing authority may lead to recalling of the license III. After the
test, the licensing authority may deny issuing the license |
I & II
I. Before a license is issued an
individual must be tested. II. Violation of the rules from
the licensing authority may lead to recalling of the license |
The danger with
information matching is that everyone knows who will use the built profiles
from the matched information and where it will be used |
False |
One of the
contributing factors in the cause of violations is when consumers lack the
knowledge of how what they consider a little bit of information can turn into
a big invasion of privacy |
True |
This theory states
that ethical statements cannot be proven and are really only statements about
how someone feels. |
emotivism |
Which is not true
about the word profession? |
Since the beginning, there is an
emphasis on intellectual capabilities for membership in a group as it is
deemed important |
Legal acts conform
to what an individual believes to be the right thing to do. |
False |
Ethics is defined
as a field of inquiry whose subject is human actions and these human actions
are called |
human conduct |
It is developed
over a period of time based on either the religion or culture of the
indigenous people in the area. |
Community Code |
According to this
theory actions are judged according on the results. For example, a person
kills one person to prevent the deaths of others. |
Consequentialism |
Rules that guides
individual actions such as not taking the possessions of others are called |
directives |
Under what
condition can data collections become an invasion of privacy? |
when information is used for
unauthorized purposes |
It is the core of
human dignity and autonomy |
privacy |
It is the
application of data mining techniques to discover patterns from the Web |
web mining |
It comes from an
enforceable part of the moral code that differs with each society and
culture. |
conventional law |
A provider of
service should first inquire the customer before an action of service should
be done. This statement shows _______. |
Autonomy |
There are different
strands of information to be protected, which does not belong to a group: |
Employment Information |
The decision-making
process is developed that individuals tend to execute automatically without
thinking about the steps that go through. The step that involves others in
brainstorming is __________. |
Identify Alternatives |
The two kinds of
rules of conduct; Directives which involves the macroethical level and Social
policies that involves the microethical level. |
False |
It is a human
cognitive process of looking for ways to generate or affirm a proposition |
reasoning |
This is another term
for large commercial databases |
data warehouse |
It is when an
action is right if the consequences of that action are favorable to all
except the actor |
Altruism |
Determinative Laws
fixes ways of acting in accordance with natural law. |
True |
It is when ethical
reasoning remained the same even with the evolution of ethical discipline. |
Emotivism |
Which of the
following does not describe the word ethics? |
widely shared social conventions
about right and wrong |
Listening in to
other people's conversations is an example of what privacy violation? |
Interception of Information |
Which is true about
Morality? |
It prevents harm and suffering, a
moral system aims at promoting human flourishing |
Harassment is a
form of discrimination and it mainly involves making decisions that
negatively affect an individual |
False |
It is an invasion
of privacy by wrongful entry, seizing, or acquiring possession of the
property of others |
intrusion |
As humans tend to
follow a life script, an individual's reaction to certain rules of conduct is
always intentional. |
False |
Individuals whose
data are mined can become identified with or linked to certain newly created
groups. |
True |
These are
guidelines that state the dos and dont's of a professional that protects
individual members and their image. |
Professional Code |
Showing an act of
kindness in exchange to an equal act of kindness is an example what
culturefree moral codes? |
the bronze rule |
In order for
professions and trades to uphold essential requirements, integrity,
commitment, and professional codes of conduct must be met. |
False |
It is an act of
seeking public attention to what is considered an illegal or mismanaged act |
whistle-blowing |
It is an
interpretation is done based on a system that uses a process of argumentation
consisting of a mixture of inductions and deductions |
Ethical theories |
With the
relationship between the provider and receiver of the service/product
present, a power play may sometimes be in favor of the provider not the
receiver |
True |
The primary purpose
of professional code of ethics is to promote the public image of the
profession by specifying and enforcing the ethical behavior expected from its
members |
False |
For formal
education to be effective in teaching and enforcing the pillars of
professionalism it must be _________ |
Incremental |
It is a system
created by and for human beings usually in public deliberations like a
council of elders or representatives in national legislatures. |
Conventional Law |
If the codes of
conduct focuses on rules and guidelines, autonomy focuses on |
power balance |
It is an unwritten
law that holds our rights of self-preservation |
natural law |
The moral concept
of whistle-blowing is good when the activities involved pose serious danger
and harm to human life |
True |
It involves the
indirect gathering of personal information through an analysis of implicit
patterns discoverable in data. |
Data Mining |
It takes part in
building character traits in people. |
morality |
Individuals whose
data are mined cannot be identified with or linked to certain newly created
groups. |
False |
The danger with
information matching is that no one knows who will use the built profiles
from the matched information and where it will be used |
True |
One of the contributing
factors in the cause of violations is when consumers lack the ethics of how
what they consider a little bit of information can turn into a big invasion
of privacy |
False |
Frauds are
sometimes a form of collaboration between an employee and a non-employee |
True |
It is a type of
offense when an individual accesses the whole or part of a computer system
without permission or right |
illegal access |
Which is not a
characteristic of an intellectual object: |
It is easily owned |
The owner of a
patent has no right to prevent third parties from using the patented product
if it has been put on the market by the owner of the product |
True |
It is a right to
distribute, display, perform, or reproduce an original work in copies or to
prepare derivative works based on the work |
copyright |
Maintaining the
status quo by preventing the unauthorized modification of files is an example
of |
integrity |
Match the words to the given choices: |
|
reclusion and
isolation |
Psychological Effects |
unauthorized ways |
Cyberpiracy |
reckless hindering |
System Interference |
shapes and colors |
Trademark |
reckless alteration |
Data Interference |
creative works |
Copyright |
inventions |
Patents |
unauthorized access |
Cybertrespass |
computer programs |
Original w orks |
adaptations |
Derivative w orks |
All of the
statements are true about the first requirement of a Patent Work except: |
It must serve a basic purpose |
Dramatizations,
translations, and adaptations of musicals are example of |
derivative works |
This penalty will
cause an accused to be imprisoned for two to four decades. |
reclusion perpetua |
A set of legal
rights which result from intellectual activity in the industrial, scientific,
literary, and artistic fields is called |
intellectual property |
In Spear-phishing,
con artists send legitimate looking e-mails urging the recipient to take
action to avoid a negative consequence or to receive a reward. |
False |
Shapes cannot be
registered as trademarks if the shapes are not necessitated by technical
factors |
True |
A patent must not
be obvious to the general public |
False |
It includes the
integrity, confidentiality, and availability of information at the servers |
information security |
Individuals found
guilty of child pornography violated _____________. |
Anti-Child Pornography Act of
2009 |
If intimidation and
fear of reprisals is present, __________ is good because useful information
may be revealed |
anonymity |
When two persons
have jointly made an invention, the right to the patent shall belong to
_______. |
Both of them |
Which of the
following does not belong to the group? |
Collective marks |
Republic Act No.
8293 is also known as the __________ |
intellectual property code of the
Philippines |
One of the
advantages of anonymity is that disputes could be solved if information from
individuals’ party to these disputes can reveal the necessary information |
False |
They launch
computer-based attacks against other computers or networks in an attempt to
intimidate or coerce a government in order to advance certain political or
social objectives |
cyberterrorist |
It is hardware or
software used to isolate the sensitive portions of an information system
facility from the outside world and limit the potential damage that can be
done by a malicious intruder |
fireworks |
Worms are programs
where malicious code is hidden inside a seemingly harmless program |
False |
A patent claim can be cancelled if it adheres
to the public order. |
False |
The alteration of
information may be caused by the disclosure of personal information |
False |
These individuals
test the limitations of information systems out of intellectual curiosity |
Hackers |
These are set of
programs that enables its user to gain administrator level access to a
computer without the end user’s consent or knowledge |
rootkit |
Which among the
following has the shortest imprisonment charge. |
arresto mayor |
Which is not true
about an Insider Threat. |
The only suspects are employees |
Which does not
belong to the group? |
Works of Applied Art |
Which does not
belong to the group: |
Denial of Service |
Instilling fear and
doubt and compromising the integrity of the data can lead to |
extortion |
Which does not
belong to the group: |
Scarcity |
One is not known by
any name including pseudo names. |
anonymity |
It is the
acquisition of a domain name on the Internet in bad faith or with the intent
to profit, mislead, destroy one’s reputation or deprive others from
registering the same domain name. |
Cybersquatting |
Which among the
following has the longest imprisonment charge |
reclusion perpetua |
They use hacking to
achieve a political or social goal. |
hacktivists |
The increasing
level of familiarity in human actions, may it be good or bad is called
_______. |
Moral Decay |
Penetration can be
done with or without the use of the internet |
True |
Both the sender and
the receiver each have a pair of keys, one public and one private. |
asymmetric encryption |
Match the following words to the given choices |
|
E-mail Fraud |
Phishing |
Digital Signature |
Authentication |
Preventing of unauthorized
disclosure of information |
Confidentiality |
Encryption and
Authentication |
Information security |
Rootkit |
Exploits |
Sensors, Security
Lighting and Natural Trees |
Physical Security Barriers |
Secret-key
Encryption |
Symmetric encryption |
No Identity |
Anonymity |
Coded Messages |
Cryptography |
Witness Protection |
Pseudo identity |
It is a three
dimensional interactive computer generated environment that incorporates a
first person perspective |
virtual reality |
AIs have the
capacity to perform better than the world best experts at many tasks already
and are making the world healthier |
Performance |
Determining
customer behavior and preferences. |
Prediction |
Which of the
following is not true about blogs? |
Communicate with one another
through e-messaging services that include video |
The short text
messages in Twitter are called |
tweets |
It is a Website
that contains an online personal journal with reflections, comments, and
often hyperlinks provided by the writer |
blog |
It can cause harm
by failing to uphold standards of accuracy. |
misrepresentations |
Humans are not
perfect; they are emotional, biased, easily manipulated and easily bored
beings. Machines, however, don‘t have any of these problems. |
Safety |
It has been linked
to depression, self-injurious behaviors, sleep disturbances, increased
alcohol and tobacco use, and obesity |
internet addiction |
Which statement is
true about Artificial Intelligence?
I.
Artificial intelligence studies concentrate on a limited number of areas II.
Artificial intelligence is bounded to the potential of solving real life
problems |
Both Statements are True |
Which of the
following is a purpose of a social networking web site? I. Breakdown the
barriers of distance and time II. Bridge cultural differences III. Create an
online community IV. Social
Interaction |
All of the Above |
As the social
network grows, it tends to lose the nuances of a local system. So in order to
maintain the qualities of network properties, one must take note of the size. |
True |
The human errors in
coding can be sometimes referred to as |
bugs |
It is a mediation
of interaction through an electronic medium between humans and humans as well
as between humans and machines |
virtualization |
It is the
harassment, torment, humiliation, or threatening of one minor by another
minor or group of minors via the Internet or cell phone |
Cyberbullying |
Its goal is to
create a buzz about a product or idea that spreads wide and fast |
viral marketing |
Since morality is
culturally based, individuals are bound to live within the guidelines the
society lives with. |
True |
Republic Act No.
8293 is also known as the |
Intellectual |
It enables an
individual to capture life's best moments with thier phone’s camera or any
other camera, and convert them into works of art. |
instagram |
It is a messaging
social platform that enables a user to chat with friends by using pictures |
snapchat |
Human Nature can
result to a bias environment that AIs might learn from. |
True |
It is the data left
behind by users of electronic media |
sleep deprivation |
It is threatening
behavior or unwanted advances directed at an adult using the Internet or
other forms of online and electronic communications |
Cyberstalking |
AIs are software
programs that are vulnerable to attack just like all software |
True |
An AI can achieve
its goal without going through consequences |
True |
AIs are able to
automating parts of people‘s jobs and it wont affect the employment rate in a
company |
False |
The data that the
AI technology is using to train and learn mostly coveres all the aspect of
human behavior |
False |
Question 1
ReplyDeleteCorrect
Mark 1.00 out of 1.00
Question 2
Correct
Mark 1.00 out of 1.00
Intellectual objects characteristics that are a product or manifestation or expressions of ideas such as literary/ creative works and
inventions.
a. No scarcity
b. Legal claim
c. Non-exclusionary
d. Non-tangible
Your answer is correct.
A type of Penetrration attack where an insiders are a major source of computer crimes because they do not need a great deal of
knowledge about the victim computer system. Insiders are not necessarily employees; they can also be consultants and contractors.
a. Criminal Groups
b. Hackers
c. Hacktivists and Cyberterrorists
d. Insider Threat
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Question 4
Correct
Mark 1.00 out of 1.00
Question 5
Correct
Mark 1.00 out of 1.00
It is a string of usually six or more to verify a user to an information system facility, usually digital system.
a. Information security
b. Passwords
c. Physical security
d. Firewalls
Your answer is correct.
A set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge.
a. Distributed denial-of-service attack (DDoS)
b. Phishing
c. Rootkit
d. E-mail spam
Your answer is correct.
A process whereby the system gathers and builds up information about the user to assure that the user is genuine.
a. Asymmetric encryption
b. Symmetric encryption
c. Authentication
d. Passwords
Your answer is correct.
Question 6
Incorrect
Mark 0.00 out of 1.00
Question 7
Correct
Mark 1.00 out of 1.00
Question 8
Correct
Mark 1.00 out of 1.00
It is hardware or software used to isolate the sensitive portions of an information system facility from the outside world and limit the
potential damage that can be done by a malicious intruder.
a. Physical security
b. Passwords
c. Firewalls
d. Information security
Your answer is incorrect.
Are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one
account to another to another.
a. Insider Threat
b. Hackers
c. Hacktivism
d. Cybercriminals
Your answer is correct.
The access to the whole or any part of a computer system without right.
a. Illegal Access
b. Data Interference
c. System Interference
d. Illegal Interception
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Question 10
Correct
Mark 1.00 out of 1.00
Question 11
Incorrect
Mark 0.00 out of 1.00
A category of Cybercrime using cybertechnology to gain unauthorized access.
a. Cyberpiracy
b. Cybervandalism
c. Cybertrespass
d. Computer crime
Your answer is correct.
A method that protects the communications channel from sniffers — programs written for and installed on the communication
channels to eavesdrop on network traffic, examining all traffic on selected network segments.
a. Cryptography
b. Firewalls
c. Passwords
d. Encryption
Your answer is correct.
Anonymous servers where identifying information is not forwarded in packet headers.
a. Pseudonymous Servers
b. Full Anonymity Servers
c. Anonymity
d. Pseudo identity
Your answer is incorrect.
Question 12
Correct
Mark 1.00 out of 1.00
Question 13
Correct
Mark 1.00 out of 1.00
Question 14
Correct
Mark 1.00 out of 1.00
A combination of the words hacking and activism, is hacking to achieve a political or social goal.
a. Insider Threat
b. Hackers
c. Hacktivism
d. Criminal Groups
Your answer is correct.
It is concerned with securing computer networks—i.e., from privately owned computer networks to the Internet itself — against
various kinds of attacks.
a. Network Security
b. Symmetric encryption
c. Asymmetric encryption
d. Authentication
Your answer is correct.
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data
message, without right, including the introduction or transmission of viruses.
a. System Interference
b. Illegal Access
c. Illegal Interception
d. Data Interference
Your answer is correct.
Question 15
DeleteCorrect
Mark 1.00 out of 1.00
Question 16
Correct
Mark 1.00 out of 1.00
Question 17
Correct
Mark 1.00 out of 1.00
The acquisition of a domain name on the Internet in bad faith or with the intent to profit, mislead, destroy one’s reputation or deprive
others from registering the same domain name.
a. Cybersquatting
b. Misuse of Devices
c. Illegal Access
d. System Interference
Your answer is correct.
Intellectual objects characteristics that is an act or instance of excluding; the state of being excluded.
a. Non-exclusionary
b. Non-tangible
c. Legal claim
d. No scarcity
Your answer is correct.
Defined as the state of being nameless, having no identity.
a. Untraceable identity
b. Anonymity
c. Pseudo identity
d. Pseudonymous
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Question 19
Correct
Mark 1.00 out of 1.00
Question 20
Correct
Mark 1.00 out of 1.00
An individual is identified by a certain pseudonym, code, or number; like that of a writer.
a. Anonymity
b. Pseudo identity
c. Pseudonymous
d. Untraceable identity
Your answer is correct.
A set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge.
a. Rootkit
b. E-mail spam
c. Distributed denial-of-service attack (DDoS)
d. Phishing
Your answer is correct.
Broadly describes tangible things such as ideas, inventions, technologies, artworks, music and literature, and others that one can claim
ownership to.
a. Trade Marks
b. Intellectual Property
c. Patent
d. Intellectual Property
Your answer is correct.
Question 21
Incorrect
Mark 0.00 out of 1.00
Question 22
Correct
Mark 1.00 out of 1.00
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic
data message, without right or authority, including the introduction or transmission of viruses.
a. Illegal Access
b. Illegal Interception
c. Data Interference
d. System Interference
Your answer is incorrect.
A large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their
owners.
a. Worm
b. Viruses
c. Botnet
d. Trojan horse
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Question 24
Incorrect
Mark 0.00 out of 1.00
Question 25
Correct
Mark 1.00 out of 1.00
Intellectual objects characteristics that defines that one cannot own an idea in the same sense that one can own a physical object;
ideas themselves are not the kinds of things for which governments are willing to grant ownership rights to individuals.
a. Non-tangible
b. No scarcity
c. Non-exclusionary
d. Legal claim
Your answer is correct.
They penetrate a computer system for a number of reasons and uses a variety of techniques. Using the skills they have, they download
attack scripts and protocols from the Internet and launch them against victim sites.
a. Hacktivism
b. Cybercriminals
c. Insider Threat
d. Hackers
Your answer is incorrect.
The science of writing and reading coded messages, forms the basis for all secure transmission.
a. Cryptography
b. Encryption
c. Passwords
d. Firewalls
Your answer is correct.
Question 26
Correct
Mark 1.00 out of 1.00
Question 27
Correct
Mark 1.00 out of 1.00
Question 28
Correct
Mark 1.00 out of 1.00
The exclusive right to distribute, display, perform, or reproduce an original work in copies or to prepare derivative works based on the
work.
a. Patent
b. Intellectual Property
c. Trade Marks
d. Copyright
Your answer is correct.
This type of attacks are for mundane reasons that may involve business, social or personal issues.
a. The Hacker’s Ethics
b. Vendetta
c. Hacktivism
d. Joke/Hoax
Your answer is correct.
A program in which malicious code is hidden inside a seemingly harmless program.
a. Worm
b. Trojan horse
c. Botnet
d. Viruses
Your answer is correct.
Question 29
DeleteCorrect
Mark 1.00 out of 1.00
Question 30
Correct
Mark 1.00 out of 1.00
Question 31
Correct
Mark 1.00 out of 1.00
There are many causes that lead to political activism, but all these causes are
grouped under one burner and it is called _______.
a. Hacktivism
b. The Hacker’s Ethics
c. Joke/Hoax
d. Vendetta
Your answer is correct.
It involves prevention of access to information by encryption, authentication, and other means.
a. Physical security
b. Pseudonymous Servers
c. Information security
d. Full Anonymity Servers
Your answer is correct.
Intellectual objects characteristics that can be easily reproduced.
a. No scarcity
b. Legal claim
c. Non-exclusionary
d. Non-tangible
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Question 33
Correct
Mark 1.00 out of 1.00
Question 34
Correct
Mark 1.00 out of 1.00
Anonymous servers where it puts pseudonym in forwarded packet headers, keeping the real identity behind a pseudonym, but being
able to receive and forward all packets sent to the pseudonym to the real server.
a. Full Anonymity Servers
b. Pseudonymous Servers
c. Anonymity
d. Pseudo identity
Your answer is correct.
Is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
a. Rootkit
b. Phishing
c. Distributed denial-of-service attack (DDoS)
d. E-mail spam
Your answer is correct.
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually
undesirable manner.
a. Viruses
b. Worm
c. Trojan horse
d. Botnet
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Question 36
Correct
Mark 1.00 out of 1.00
Question 37
Correct
Mark 1.00 out of 1.00
Unlike the copyright that protects expressions, _________ protect inventions or discoveries.
a. Trade Marks
b. Patent
c. Intellectual Property
d. Copyright
Your answer is correct.
Often referred to as the secret-key encryption, it uses a common key and the same cryptographic algorithm to scramble and
unscramble the message.
a. Passwords
b. Firewalls
c. Asymmetric encryption
d. Symmetric encryption
Your answer is correct.
This is a collection of motives that make up the hacker character. If any ofthese beliefs is violated, a hacker will have a motive.
a. Hacktivism
b. Vendetta
c. Joke/Hoax
d. The Hacker’s Ethics
Your answer is correct.
Question 38
Correct
Mark 1.00 out of 1.00
Question 39
Correct
Mark 1.00 out of 1.00
The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.
a. Illegal Access
b. System Interference
c. Illegal Interception
d. Misuse of Devices
Your answer is correct.
A crime like any other crime, except that in this case the illegal act must involve a computer system either as an object of a crime, an
instrument used to commit a crime, or a repository of evidence related to a crime.
a. Cybersquatting
b. System Interference
c. Misuse of Devices
d. Computer crime
Your answer is correct.
Question 40
Correct
Mark 1.00 out of 1.00
Question 41
Correct
Mark 1.00 out of 1.00
Question 42
Correct
Mark 1.00 out of 1.00
The interception made by technical means without right of any non-public transmission of computer data to, from, or within a
computer system includingelectromagnetic emissions from a computer system carrying such computer data.
a. Illegal Access
b. Illegal Interception
c. Data Interference
d. System Interference
Your answer is correct.
It involves the prevention of access to physical facilitates like computer systems.
a. Pseudonymous Servers
b. Physical security
c. Full Anonymity Servers
d. Information security
Your answer is correct.
One in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data
and other small tasks.
a. Rootkit
b. E-mail spam
c. Phishing
d. Distributed denial-of-service attack (DDoS)
Your answer is correct.
Question 43
DeleteCorrect
Mark 1.00 out of 1.00
Question 44
Incorrect
Mark 0.00 out of 1.00
Question 45
Incorrect
Mark 0.00 out of 1.00
A harmful program that resides in the active memory of the computer and duplicates itself.
a. Viruses
b. Worm
c. Botnet
d. Trojan horse
Your answer is correct.
A category of Cybercrime using cyber technology in unauthorized ways
a. Cybervandalism
b. Cyberpiracy
c. Cybertrespass
d. Computer crime
Your answer is incorrect.
A Social and Ethical Consequences that may lead to individual reclusion and increasing isolation.
a. Psychological Effects
b. Trust
c. Moral decay
d. Loss of privacy
Your answer is incorrect.
Question 46
Incorrect
Mark 0.00 out of 1.00
Question 47
Correct
Mark 1.00 out of 1.00
Question 48
Correct
Mark 1.00 out of 1.00
A category of Cybercrime using cyber technology to unleash one or more programs.
a. Cyberpiracy
b. Cyber vandalism
c. Computer crime
d. Cybertrespass
Your answer is incorrect.
It uses two different keys, a public key known by all and a private key known by only the sender and the receiver. Both the sender and
the receiver each have a pair of these keys, one public and one private. It is commonly known as public-key encryption.
a. Symmetric encryption
b. Asymmetric encryption
c. Passwords
d. Firewalls
Your answer is correct.
It is not only about obtaining information; it is also about instilling fear and doubt and compromising the integrity of the data, which
leads to extortion.
a. Terrorism/Extortion
b. Hacktivism
c. Joke/Hoax
d. The Hacker’s Ethics
Your answer is correct.
Question 49
Correct
Mark 1.00 out of 1.00
Question 50
Correct
Mark 1.00 out of 1.00
Are warnings that are actually scare alerts started by one or more malicious persons and are passed on by innocent users who think
that they are helping the community by spreading the warning.
a. Joke/Hoax
b. Hacktivism
c. Vendetta
d. The Hacker’s Ethics
Your answer is correct.
This are driven by the selfishness of individuals who are not satisfied with what they have and are always wanting more, mostly
financially.
a. Terrorism/Extortion
b. Personal Gain/Fame/Fun
c. The Hacker’s Ethics
d. Joke/Hoax
Your answer is correct.