1.6.2.1 Ethics Quiz
Question
An employee is laid off after fifteen years with the same company. The employee is then
hired by another company within a week. In the new company, the employee shares documents
and ideas for products that the employee proposed at the original company.
-
ethical
-
unethical
Explanations
Even though the employee was laid off, the employee probably signed a Non-Disclosure
Agreement (NDA) with the original company. Any work or idea developed at the original
company, regardless of who proposed the idea, is still the property of the original
company. Depending on the level of severity of the breach, this could result in legal
action.
Answer: unethical
Question
During a meeting with the Marketing department, a representative from IT discusses features
of an upcoming product that will be released next year.
-
ethical
-
unethical
Explanations
Both the employee and the manager are within the same department and company so this
behavior would be ethical.
Answer: ethical
Question
An employee is at a restaurant with friends and describes an exciting new video game that is
under development at the company the employee works for. Is the behavior of the employee
ethical or unethical?
-
ethical
-
unethical
Explanations
It is not ethical to share a confidential product idea before it is released. Describing
the game to a group of friends outside the company could leak the idea and jeopardize
the new product offering.
Answer: unethical
Question
Alicia, a company employee, has lost her corporate identification badge. She is in a hurry
to get to a meeting and does not have time to visit Human Resources to obtain a temporary
badge. You lend her your identification badge until she can obtain a replacement.
-
ethical
-
unethical
Explanations
Employees should never give their credentials to another employee, regardless of the
situation or the familiarity with the other employee. Once your credentials are out of
your sight, you have no idea what they are being used for.
Answer: unethical
Question
An employee points out a design flaw in a new product to the department manager.
-
ethical
-
unethical
Explanations
Both the employee and the manager are within the same department and company so this
behavior would be ethical.
Answer: ethical
1.6.2.2 Quiz to module 1
Question
Which method is used to check the integrity of data?
-
backup
-
encryption
-
authentication
-
checksum
Explanations
A checksum value of a block of data is calculated and transmitted with the data. After
the data is received, the checksum hashing is performed again. The calculated value is
compared with the transmitted value to verify the integrity of the data.
Answer: checksum
Question
What is a reason that internal security threats might cause greater damage to an
organization than external security threats?
-
Internal users have direct access to the infrastructure devices.
-
Internal users have better hacking skills.
-
Internal users can access the corporate data without authentication.
-
Internal users can access the infrastructure devices through the Internet.
Explanations
Internal threats have the potential to cause greater damage than external threats
because internal users have direct access to the building and its infrastructure
devices. Internal users may not have better hacking skills than external attackers. Both
internal users and external users can access the network devices through the Internet. A
well designed security implementation should require authentication before corporate
data is accessed, regardless of whether the access request is from within the corporate
campus or from the outside network.
Answer: Internal users have direct access to the infrastructure devices.
Question
What is another name for confidentiality of information?
-
trustworthiness
-
privacy
-
accuracy
-
consistency
Explanations
Privacy is another name for confidentiality. Accuracy, consistency, and trustworthiness
describe integrity of data.
Answer: privacy
Question
What is an example of “hacktivism”?
-
A group of environmentalists launch a denial of service attack against an oil company
that
is responsible for a large oil spill.
-
A country tries to steal defense secrets from another country by infiltrating government
networks.
-
A teenager breaks into the web server of a local newspaper and posts a picture of a
favorite
cartoon character.
-
Criminals use the Internet to attempt to steal money from a banking company.
Explanations
Hacktivism is a term used to describe cyberattacks carried out by people who are
considered
political or ideological extremists. Hacktivists attack people or organizations that
they
believe are enemies to the hacktivist agenda.ee and the manager are within the same
department and company so this behavior would be ethical.
Answer: A group of environmentalists launch a denial of service attack against an oil
company that is responsible for a large oil spill.
Question
What is the motivation of a white hat attacker?
-
discovering weaknesses of networks and systems to improve the security level of these
systems
-
taking advantage of any vulnerability for illegal personal gain
-
fine tuning network devices to improve their performance and efficiency
-
studying operating systems of various platforms to develop a new system
Explanations
White hat attackers break into networks or computer systems in order to discover
weaknesses for the purpose of improving the security of these systems. These break-ins
are done with permission from the owner or the organization. Any results are reported
back to the owner or the organization.oyee and the manager are within the same
department and company so this behavior would be ethical.
Answer: discovering weaknesses of networks and systems to improve the security level
of these systems
Question
What three items are components of the CIA triad? (Choose three.)
-
availability
-
confidentiality
-
integrity
-
intervention
-
access
-
scalability
Explanations
The CIA triad contains three components: confidentiality, integrity, and availability.
It is a guideline for information security for an organization.
Answer: integrity, availability, confidentiality
Question
Which statement describes cyberwarfare?
-
Cyberwarfare is an attack carried out by a group of script kiddies.
-
It is a series of personal protective equipment developed for soldiers involved in
nuclear war.
-
It is Internet-based conflict that involves the penetration of information systems of
other
nations.
-
It is simulation software for Air Force pilots that allows them to practice under a
simulated
war scenario.
Explanations
Cyberwarfare is an Internet-based conflict that involves the penetration of the networks
and
computer systems of other nations. Organized hackers are typically involved in such an
attack.
Answer: It is Internet-based conflict that involves the penetration of information
systems of
other nations.
Question
Match the type of cyber attackers to the description.
Make political statements in order to create an awareness of issues that are important to
them.
-
terrorists
-
hacktivists
-
state-sponsored attackers
-
script kiddies
Answer
hacktivists
Question
Match the type of cyber attackers to the description.
Gather intelligence or commit sabotage on specific goals on behalf of their government.
-
terrorists
-
hacktivists
-
state-sponsored attackers
-
script kiddies
Answer
state-sponsored attackers
Question
Match the type of cyber attackers to the description.
Make political statements, or create fear, by causing physical or psychological damage to
victims.
-
terrorists
-
hacktivists
-
state-sponsored attackers
-
script kiddies
Answer
terrorists
Question
What are three methods that can be used to ensure confidentiality of information? (Choose
three.)
-
backup
-
file permission settings
-
version control
-
two factor authentication
-
username ID and password
-
data encryption
Explanations
Methods including data encryption, username ID and password, and two factor
authentication can be used to help ensure confidentiality of information. File
permission control, version control, and backup are methods that can be used to help
ensure integrity of information.
Answer: data encryption, two factor authentication, username ID and password
Solved quizzes