Professional Documents
Culture Documents
Ethics MCQ 27 page (NEW)
Ethics MCQ 27 page (NEW)
What ethical principle encourages individuals to be transparent and open about their online actions and intentions?
A) Accountability
B) Privacy
C) Honesty
D) Fair use
ANSWER: C
What is the term for a work that is no longer protected by copyright and can be freely used by the public?
A) Creative Commons work
D) Copyrighted work
ANSWER: C
What should you do if you come across online content that promotes hate speech or discrimination?
ANSWER: B
B) Literary works
C) Brand names, logos, and symbols
D) Scientific research
ANSWER: C
What is the term for the legal process of transferring a copyright or patent from one person or entity to another?
A)Licensing
B) Public domain
C)Infringement
D)Attribution
ANSWER: A
C) News ar ticles
D) Weather forecasts
ANSWER: B
What is the term for the practice of gaining unauthorized access to computer systems and networks with malicious intent?
A) Privacy invasion
B) Hacking
C) Digital literacy
D) Encryption
ANSWER: B
What is the term for the act of intentionally spreading computer viruses, malware, or other harmful software?
A) Ethical hacking
B) Responsible technology use
ANSWER: D
ANSWER: B
Which of the following is a common method to secure personal data and protect online privacy?
ANSWER: C
ANSWER: C
What should you do to respect copyright when using someone else's image in your presentation?
ANSWER: B
B)Online popularity
ANSWER: D
What is the term for the act of using technology to advocate for social or political causes?
B) Ethical hacking
C) Online activism
D) Disinform
ation ANSWER: C
ANSWER: C
What is the term for a legal agreement between a website or app provider and users that outlines how user data will be collected and
used?
A) Privacy breach
B) Privacy policy
C) Data encryption
D) Online
tracking ANSWER:
A)To grant permission for specific uses of creative works with certain conditions
permission ANSWER: A
Which of the following actions can help protect personal data when using public Wi-Fi networks?
ANSWER: C
Ethics MCQs
What is the role of a chief privacy officer (CPO) in an organization?
policies ANSWER: D
What is the term for the act of using technology to gain unauthorized access to computer systems for ethical and lawful purposes, such
as identifying vulnerabilities?
B) Malware distribution
C) Ethical hacking
D) Online
tracking ANSWER:
D) Reporting cyberbullying
incident ANSWER: C
Which ethical principle emphasizes the importance of being accountable for one's actions in the digital realm?
A) Tran sp aren cy
B) Accountability
C) Honesty
D) Privacy
ANSWER: B
ANSWER: D
With my best wishes for success, DC 511444 , 4 44,
Ethics MCQs
Which of the following actions can help protect against identity theft online?
ANSWER: C
What is the term for a legal requirement that organizations must follow to protect individuals' personal data and privacy?
A) Fair use doctrine
B) Encryption policy
ANSWER: D
What is the term for the practice of obtaining sensitive information through deceptive emails or websites?
A) Privacy breach
B) Phishing
C) E n cr y p t i o n
D) Data encryption
ANSWER: 13
What is the term for the act of sending unsolicited and often irrelevant messages to a large number of email addresses for advertising or
other purposes?
A) Ethical hacking
B) Phishing
C) Cyberbullying
D) Spamming
ANSWER: D
What should individuals do to protect their personal information and privacy when using social media platforms?
A) Share personal details openly
B) Accept all friend requests without verification
ANSWER: C
Ethics MCQs
What is the term for the practice of using technology to harass, threaten, or intimidate others online?
A) Ethical hacking
C) Privacy invasion
ANSWER: B
Which ethical principle encourages individuals to be mindful of the potential consequences of their online actions?
A) Tr an sp aren cy
B) Honesty
C) Accountability
D) Fair u se
ANSWER: A
What is the term for a unique symbol, word, or phrase used to identify and distinguish a company's products or services?
A) Copyright
B) Pat en t
C) Trademark
D) Fair u se
ANSWER: C
What is the term for the right to control how a work is used and to receive payment for its use?
A) Pu b l ic d o m ain
B) Copyright
D) Fair u se
ANSWER: B
What is the term for legal principle that allows use of copyrighted material without permission for purposes such as criticism, news
reporting, & education?
A) Pu b l ic d o m ain
C) Fair use
D) Copyright infringement
ANSWER: C
A) Copyright infringement
B) Fair use
ANSWER: D
What is the term for the act of securing data by encoding it so that only authorized parties can read and use it?
A) Data breach
B) Privacy invasion
C) Encryption
D) Phishing
ANSWER: C
What is the term used to describe the act of intentionally overloading a computer system or network to disrupt its normal functioning?
A) Phishing
B) Hacking
C) Spoofing
D) Denial-of-service attack
ANSWER: D
A) worm s
B) Trojans
C) spyware
D) cookies
ANSWER: D
A computer network security that monitors and controls incoming and outgoing traffic is
A) Coo kies
B) Viru s
C) Firewall
D) w o r m s
ANSWER: C
A) Ransomware attacks
B) Identity theft
C) Software piracy
ANSWER: D
Cyber attackers can shut down a business by encrypting its website in a type of attack called:
A) Denial-of-service attack
B) Identity theft
C) Software piracy
D) Financial theft
ANSWER: A
A) Ransomware attacks
B) Data breaches
D) Software piracy
ANSWER: B
B) Software company
C) Med ia co mpany
D) Retail business
ANSWER: A
A) External hacking
C) Ransomware attacks
D) Software piracy
ANSWER: B
C) Impossible online
D) I lleg al
ANSWER: B
C) Online hacking
D) Financial theft
ANSWER: A
C) Copyright infringement
D) Software piracy
ANSWER: A
A) Ransomware attacks
D) Software piracy
ANSWER: B
A) Privacy information
C) Financial information
D) Med ia co nten t
ANSWER: B
A) Do S attack s
B) A n t i v ir u s
C) Trojan horses
D) Spyware
ANSWER: B
ANSWER: D
B) Upgrading software
C) Data encryption
ANSWER: D
B) Password information
C) Financial details
D) Device information
ANSWER: A
ANSWER: B
C) Virus transmission
D) Data theft
ANSWER: B
A) Equipment disposal
C) Software patching
D) Network traffic
ANSWER: B
C) Security modifications
D) Effects of an attack
ANSWER: D
A) Data breaches
B) Ransomware attacks
C) User m istakes
D) Trojan threats
ANSWER: C
D. Destructive Trojans
ANSWER: C
A computer is a self-contained program that is able to spread functional copies of itself or its segments to other computer
systems.
A. vir us
B. worm
C. Trojan
horse
D. Spy
ware
ANSWER: B
_____ viruses infect Microsoft Word application and typically insert unwanted words or phrases.
A. File infector
B. Macro
C. Boot sector
D. System
ANSWER: B
A _____ attack is also an attack on system's resources, but it is launched from a large number of other host machines that are infected
by malicious software controlled by the attacker.
A. DoS
B. DDoS
C. Trojan
D. W o r m
ANSWER: B
___ programs can collect various types of personal information such as Internet surfing habits and Websites that have been visited.
A. Viruses
B. Spyware
C. DoS
D. Worms
ANSWER: B
A. DoS attack
C. Virus attack
D. Wo rm at tack
ANSWER: B
A. 2
B. 3
C. 4
D. 5
ANSWER: B
A denial-of-service attack overwhelms a system's resources so that it cannot respond to service requests.
A. True B. False
ANSWER: A
B. Data encryption
D. Patch management
ANSWER: A
Which of the following is NOT a key step to mitigate cyber security risks?
ANSWER: B
Malicious software that collects information about users without their knowledge is called:
A. Viru s
B. Spyware
C. Trojan
D. Worm
ANSWER: B
A. File infector
C. Macro viruses
A computer __ is a program or piece of code that is loaded onto a computer without the knowledge of the user and runs against
the user's wishes.
A. virus
B. worm
C. Trojan horse
D. Spyware
ANSWER: A
B. Antispyware
C. Firewall
ANSWER: B
ANSWER: D
ANSWER: A
C. Upgrading software
D. Documenting assets
ANSWER: D
ANSWER: B
C. Worms
D. Destructive Trojans
ANSWER: C
A. Viru s
B. Worm
C. Trojan
D. Adware
ANSWER: D
ANSWER:B
A. True
B. False
ANSWER: B
Which type of virus infects program files like .COM and .EXE files?
A. File infectors
B.Macro viruses
Which of the following is included as a step to assess and mitigate cyber security risks?
ANSWER: C
ANSWER: C
A) Ransomware attacks
ANSWER: A
A) Pir acy
B) Hacking
C) Phishing
ANSWER: A
internet ANSWER: B
What level of access do internal moles or contract workers typically have to steal intellectual property?
A) Remo te access
B) Unauthorized access
ANSWER: C
ANSWER: B
What is the term for a set of rules and practices that organizations follow to protect personal data and ensure privacy compliance?
A. Data breach notification law
B. Privacy policy
C. Data encryption
ANSWER: B
A. Privacy invasion
B. Ethical hacking
C. Hacking
D. Accounta
bility ANSWER:
Which ethical principle emphasizes the importance of respecting the rights and privacy of individuals in the digital age?
A. Fair use
B. Accountability
C. Privacy
D. Transpar
ency ANSWER:
What is the term for act of tracking and collecting information about a user's online activities across various websites and services
without their knowledge?
A. Privacy invasion
B. Cyberbullying
C. Data encryption
D. Online tracking
ANSWER: D
What is the term for a legal protection granted to authors and creators that allows them to control how their original works are used and
distributed?
A. Fair use
B. Public domain
C. C o p y r i g h t
D. Creative Commons
ANSWER: C
What is the term for the act of pretending to be someone else online for malicious purposes?
A. Cyberbullying
B. Identity theft
C. Ethical hacking
D. Online activism
ANSWER: B
With my best wishes for success, Dz. 54744. ,01, 410
Ethics MCQs
What is the term used to describe the act of deliberately and anonymously attacking or defaming individuals or organizations online?
A. Hacking
B. Phishing
C. Spoofing
D. Cyberstalking
ANSWER: D
What is the term for the act of intentionally spreading false information online to deceive others?
A. Online collaboration
B. Digital literacy
C. Disinformation
D. Data
encryption
ANSWER: C
Which ethical principle suggests that individuals should take responsibility for their online actions and decisions?
A. Accountability
B. Transparency
C. Privacy
D. Honesty
ANSWER: A
A. Patents
B. Copyrights
C. Tradem arks
D. Email addresses
ANSWER: D
What is the term for a unique symbol, word, or phrase used to identify and distinguish a product or brand?
A. Copyright
B. Patent
C. T r a d e m a r k
D. Fair use
ANSWER: C
Ethics MCQs
Which of the following is all example of a public domain work?
B. A government document
C. copyrighted song
D. A confidential email
ANSWER: B
What ethical principle emphasizes being truthful and honest in all online interactions and communications?
A. Accountability
B.Honesty
C.Tran sp arency
D. Privacy
ANSWER: B
What is the term for the act of falsely claiming someone else's work as your own?
A. Copyright infringement
B. Plagiarism
C. Fair use
D. Attribution
ANSWER: B
What is the term for the practice of creating and using technology in ways that benefit society and promote the common good?
A. Digital citizenship
B. Cybersecurity
C. Digital literacy
D. Online tracking
ANSWER: A
Which one of the following are self-repeating and do not require a computer program to attach themselves?
A. viruses
B. wo rms
C. spyware
D. Trojans
ANSWER: A
A. spyware
B. cookies
C. worms
D. Tro
jans
ANSWER: B
A. scam
B. spam
C. fraud
D. spoofing
ANSWER: B
Which ethical principle emphasizes the responsible use of computer systems and resources to ensure equal opportunities for all
individuals?
A. Privacy
B.Integrity
C.Accessibility
D. Anon
ymity
ANSWER: C
Which ethical principle emphasizes the responsible use of computing resources to minimize environmental impact?
A. Sustainability
B. Integrity
C. Accessibility
D. Anonymity
ANSWER: A
Which ethical principle emphasizes the responsible and transparent handling of personal data by organizations?
A. Privacy
B. Integrity
C. Accessibility
D. Accountability
ANSWER: D
Ethics MCQs
Which ethical principle emphasizes the accuracy and reliability of information?
A. Privacy
B. I nt e g r it y
C. Accessibility
D. Anonymity
ANSWER: B
What is the term used to describe the act of sending deceptive emails or messages to trick individuals into revealing sensitive
information?
A. Hacking
B. Phishing
C. Spoofmg
D. Social engineering
ANSWER: B
What is the term used to describe the practice of creating multiple user accounts to manipulate online discussions, ratings, or reviews?
A. Fir ewalling
B. Hacking
C. Trolling
D. Virtualization
ANSWER: C
What is the term used to describe the practice of isolating and running multiple virtual instances of computer systems on a single physical
machine?
A. Hacking
B. E ncr yption
C. Virtualization
D. Firewalling
ANSWER: C
What is the term used to describe the act of intentionally spreading malicious software through email attachments or infected websites?
A. Hacking
B. Phishing
C. Spoofing
D. Malware
ANSWER: D
A. Privacy
B.Integrity
C.Security
D. Accessib
ility ANSWER:
B. A photography exhibition
C. A common mathematical formula
C. Software development
behavior ANSWER: D
Which of the following actions can help protect personal data and privacy when using public Wi-Fi networks?
A. Disabling firewalls
ANSWER: C
ANSWER: B
Ethics MCQs
Which of the following is an example of ethical behavior in technology use?
ANSWER: B
ANSWER: D
ANSWER: B
ANSWER: B
Which of the following is an example of a conflict of interest in the context of computer ethics?
Which of the following is an example of a potential ethical issue related to artificial intelligence (Al)?
ANSWER: D
Which of the following actions is generally considered fair use of copyrighted material?
A. Reproducing an entire copyrighted book for personal use
ANSWER: B
Which of the following is an example of a privacy concern in the context of social media?
A. Sharing photos of a vacation with friends
What is encryption primarily used for in the context of privacy and data protection?
ANSWER: D
D) Religious beliefs
ANSWER: C
ANSWER: D
A) Lessen stress
ANSWER: B
Which type of ethics focuses on procedures, values and practices related to computing technologies?
A) Moral philosophy
B) Professional ethics
C) Computer ethics
D) Religious ethics
ANSWER: C
C) Maintaining privacy
B) Blackmailing others
C) Accessing services
D) Wasting time
ANSWER: B
D) Gain employment
ANSWER: A