UGRD-ITE6202 Professional Ethics in IT/
Social & Professional I
1. Home
2. My courses
3. UGRD-ITE6202-2323T
4. MIDTERM EXAMINATION
5. MIDTERM EXAM
Started on Sunday, 3 March 2024, 10:42 AM
State Finished
Completed on Sunday, 3 March 2024, 10:58 AM
Time taken 16 mins 31 secs
Marks 45.00/50.00
Grade 90.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This is a collection of motives that make up the hacker character. If any ofthese beliefs is
violated, a hacker will have a motive.
a.
Vendetta
b.
Hacktivism
c.
Joke/Hoax
d.
The Hacker’s Ethics
Feedback
Your answer is correct.
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Are motivated by the potential for monetary gain and hack into corporate computers to
steal, often by transferring money from one account to another to another.
a.
Hackers
b.
Insider Threat
c.
Cybercriminals
d.
Hacktivism
Feedback
Your answer is correct.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A program in which malicious code is hidden inside a seemingly harmless program.
a.
Viruses
b.
Botnet
c.
Worm
d.
Trojan horse
Feedback
Your answer is correct.
Question 4
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right.
a.
Misuse of Devices
b.
Illegal Access
c.
Illegal Interception
d.
System Interference
Feedback
Your answer is incorrect.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A large group of computers controlled from one or more remote locations by hackers,
without the knowledge or consent of their owners.
a.
Trojan horse
b.
Botnet
c.
Viruses
d.
Worm
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is a string of usually six or more to verify a user to an information system facility, usually
digital system.
a.
Information security
b.
Firewalls
c.
Physical security
d.
Passwords
Feedback
Your answer is correct.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The interception made by technical means without right of any non-public transmission of
computer data to, from, or within a computer system includingelectromagnetic emissions
from a computer system carrying such computer data.
a.
System Interference
b.
Illegal Access
c.
Illegal Interception
d.
Data Interference
Feedback
Your answer is correct.
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Anonymous servers where identifying information is not forwarded in packet headers.
a.
Full Anonymity Servers
b.
Anonymity
c.
Pseudonymous Servers
d.
Pseudo identity
Feedback
Your answer is correct.
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
One in which a malicious hacker takes over computers on the Internet and causes them to
flood a target site with demands for data and other small tasks.
a.
Rootkit
b.
Phishing
c.
Distributed denial-of-service attack (DDoS)
d.
E-mail spam
Feedback
Your answer is correct.
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It involves the prevention of access to physical facilitates like computer systems.
a.
Physical security
b.
Information security
c.
Full Anonymity Servers
d.
Pseudonymous Servers
Feedback
Your answer is correct.
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A method that protects the communications channel from sniffers — programs written for
and installed on the communication channels to eavesdrop on network traffic, examining all
traffic on selected network segments.
a.
Passwords
b.
Cryptography
c.
Firewalls
d.
Encryption
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The exclusive right to distribute, display, perform, or reproduce an original work in copies or
to prepare derivative works based on the work.
a.
Trade Marks
b.
Patent
c.
Intellectual Property
d.
Copyright
Feedback
Your answer is correct.
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Often referred to as the secret-key encryption, it uses a common key and the same
cryptographic algorithm to scramble and unscramble the message.
a.
Symmetric encryption
b.
Firewalls
c.
Passwords
d.
Asymmetric encryption
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is hardware or software used to isolate the sensitive portions of an information system
facility from the outside world and limit the potential damage that can be done by a
malicious intruder.
a.
Passwords
b.
Physical security
c.
Information security
d.
Firewalls
Feedback
Your answer is correct.
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It uses two different keys, a public key known by all and a private key known by only the
sender and the receiver. Both the sender and the receiver each have a pair of these keys,
one public and one private. It is commonly known as public-key encryption.
a.
Passwords
b.
Asymmetric encryption
c.
Firewalls
d.
Symmetric encryption
Feedback
Your answer is correct.
Question 16
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A category of Cybercrime using cyber technology in unauthorized ways
a.
Computer crime
b.
Cybervandalism
c.
Cyberpiracy
d.
Cybertrespass
Feedback
Your answer is incorrect.
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
They penetrate a computer system for a number of reasons and uses a variety of
techniques. Using the skills they have, they download attack scripts and protocols from the
Internet and launch them against victim sites.
a.
Insider Threat
b.
Hacktivism
c.
Cybercriminals
d.
Hackers
Feedback
Your answer is correct.
Question 18
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A Social and Ethical Consequences that may lead to individual reclusion and increasing
isolation.
a.
Moral decay
b.
Psychological Effects
c.
Loss of privacy
d.
Trust
Feedback
Your answer is correct.
Question 19
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Intellectual objects characteristics that can be easily reproduced.
a.
Legal claim
b.
No scarcity
c.
Non-tangible
d.
Non-exclusionary
Feedback
Your answer is correct.
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A process whereby the system gathers and builds up information about the user to assure
that the user is genuine.
a.
Authentication
b.
Asymmetric encryption
c.
Symmetric encryption
d.
Passwords
Feedback
Your answer is correct.
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The access to the whole or any part of a computer system without right.
a.
Illegal Interception
b.
System Interference
c.
Illegal Access
d.
Data Interference
Feedback
Your answer is correct.
Question 22
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A type of Penetrration attack where an insiders are a major source of computer crimes
because they do not need a great deal of knowledge about the victim computer system.
Insiders are not necessarily employees; they can also be consultants and contractors.
a.
Hackers
b.
Criminal Groups
c.
Insider Threat
d.
Hacktivists and Cyberterrorists
Feedback
Your answer is correct.
Question 23
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The acquisition of a domain name on the Internet in bad faith or with the intent to profit,
mislead, destroy one’s reputation or deprive others from registering the same domain
name.
a.
Misuse of Devices
b.
System Interference
c.
Cybersquatting
d.
Illegal Access
Feedback
Your answer is correct.
Question 24
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It involves prevention of access to information by encryption, authentication, and other
means.
a.
Physical security
b.
Pseudonymous Servers
c.
Information security
d.
Full Anonymity Servers
Feedback
Your answer is correct.
Question 25
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A harmful program that resides in the active memory of the computer and duplicates itself.
a.
Viruses
b.
Botnet
c.
Trojan horse
d.
Worm
Feedback
Your answer is correct.
Question 26
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A set of programs that enables its user to gain administrator level access to a computer
without the end user’s consent or knowledge.
a.
Rootkit
b.
E-mail spam
c.
Distributed denial-of-service attack (DDoS)
d.
Phishing
Feedback
Your answer is incorrect.
Question 27
Correct
Mark 1.00 out of 1.00
Flag question
Question text
An individual is identified by a certain pseudonym, code, or number; like that of a writer.
a.
Pseudo identity
b.
Anonymity
c.
Untraceable identity
d.
Pseudonymous
Feedback
Your answer is correct.
Question 28
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A combination of the words hacking and activism, is hacking to achieve a political or social
goal.
a.
Hackers
b.
Criminal Groups
c.
Insider Threat
d.
Hacktivism
Feedback
Your answer is correct.
Question 29
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is not only about obtaining information; it is also about instilling fear and doubt and
compromising the integrity of the data, which leads to extortion.
a.
Joke/Hoax
b.
Hacktivism
c.
The Hacker’s Ethics
d.
Terrorism/Extortion
Feedback
Your answer is correct.
Question 30
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This type of attacks are for mundane reasons that may involve business, social or personal
issues.
a.
Joke/Hoax
b.
Vendetta
c.
Hacktivism
d.
The Hacker’s Ethics
Feedback
Your answer is correct.
Question 31
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The science of writing and reading coded messages, forms the basis for all secure
transmission.
a.
Firewalls
b.
Passwords
c.
Cryptography
d.
Encryption
Feedback
Your answer is correct.
Question 32
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It is concerned with securing computer networks—i.e., from privately owned computer
networks to the Internet itself — against various kinds of attacks.
a.
Symmetric encryption
b.
Network Security
c.
Authentication
d.
Asymmetric encryption
Feedback
Your answer is correct.
Question 33
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Unlike the copyright that protects expressions, _________ protect inventions or discoveries.
a.
Copyright
b.
Trade Marks
c.
Intellectual Property
d.
Patent
Feedback
Your answer is correct.
Question 34
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Intellectual objects characteristics that are a product or manifestation or expressions of
ideas such as literary/ creative works and inventions.
a.
Legal claim
b.
Non-tangible
c.
No scarcity
d.
Non-exclusionary
Feedback
Your answer is correct.
Question 35
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Intellectual objects characteristics that defines that one cannot own an idea in the same
sense that one can own a physical object; ideas themselves are not the kinds of things for
which governments are willing to grant ownership rights to individuals.
a.
Non-exclusionary
b.
Legal claim
c.
Non-tangible
d.
No scarcity
Feedback
Your answer is correct.
Question 36
Correct
Mark 1.00 out of 1.00
Flag question
Question text
There are many causes that lead to political activism, but all these causes are
grouped under one burner and it is called _______.
a.
Hacktivism
b.
Vendetta
c.
The Hacker’s Ethics
d.
Joke/Hoax
Feedback
Your answer is correct.
Question 37
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A crime like any other crime, except that in this case the illegal act must involve a computer
system either as an object of a crime, an instrument used to commit a crime, or a repository
of evidence related to a crime.
a.
Computer crime
b.
Cybersquatting
c.
Misuse of Devices
d.
System Interference
Feedback
Your answer is correct.
Question 38
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Defined as the state of being nameless, having no identity.
a.
Untraceable identity
b.
Pseudonymous
c.
Pseudo identity
d.
Anonymity
Feedback
Your answer is correct.
Question 39
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Broadly describes tangible things such as ideas, inventions, technologies, artworks, music
and literature, and others that one can claim ownership to.
a.
Intellectual Property
b.
Trade Marks
c.
Patent
d.
Intellectual Property
Feedback
Your answer is incorrect.
Question 40
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A category of Cybercrime using cyber technology to unleash one or more programs.
a.
Cybertrespass
b.
Cyberpiracy
c.
Cyber vandalism
d.
Computer crime
Feedback
Your answer is correct.
Question 41
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The intentional alteration or reckless hindering or interference with the functioning of a
computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document, or
electronic data message, without right or authority, including the introduction or
transmission of viruses.
a.
Data Interference
b.
Illegal Access
c.
Illegal Interception
d.
System Interference
Feedback
Your answer is correct.
Question 42
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A category of Cybercrime using cybertechnology to gain unauthorized access.
a.
Cybertrespass
b.
Cyberpiracy
c.
Computer crime
d.
Cybervandalism
Feedback
Your answer is correct.
Question 43
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Intellectual objects characteristics that is an act or instance of excluding; the state of being
excluded.
a.
No scarcity
b.
Non-tangible
c.
Non-exclusionary
d.
Legal claim
Feedback
Your answer is correct.
Question 44
Correct
Mark 1.00 out of 1.00
Flag question
Question text
A piece of programming code, usually disguised as something else, that causes a computer
to behave in an unexpected and usually undesirable manner.
a.
Botnet
b.
Worm
c.
Viruses
d.
Trojan horse
Feedback
Your answer is correct.
Question 45
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A set of programs that enables its user to gain administrator level access to a computer
without the end user’s consent or knowledge.
a.
Distributed denial-of-service attack (DDoS)
b.
Rootkit
c.
E-mail spam
d.
Phishing
Feedback
Your answer is incorrect.
Question 46
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Are warnings that are actually scare alerts started by one or more malicious persons and are
passed on by innocent users who think that they are helping the community by spreading
the warning.
a.
Hacktivism
b.
Joke/Hoax
c.
The Hacker’s Ethics
d.
Vendetta
Feedback
Your answer is correct.
Question 47
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This are driven by the selfishness of individuals who are not satisfied with what they have
and are always wanting more, mostly financially.
a.
Joke/Hoax
b.
Personal Gain/Fame/Fun
c.
The Hacker’s Ethics
d.
Terrorism/Extortion
Feedback
Your answer is correct.
Question 48
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The intentional or reckless alteration, damaging, deletion or deterioration of computer data,
electronic document, or electronic data message, without right, including the introduction
or transmission of viruses.
a.
Data Interference
b.
System Interference
c.
Illegal Access
d.
Illegal Interception
Feedback
Your answer is correct.
Question 49
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
a.
Rootkit
b.
Distributed denial-of-service attack (DDoS)
c.
Phishing
d.
E-mail spam
Feedback
Your answer is correct.
Question 50
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Anonymous servers where it puts pseudonym in forwarded packet headers, keeping the real
identity behind a pseudonym, but being able to receive and forward all packets sent to the
pseudonym to the real server.
a.
Pseudo identity
b.
Full Anonymity Servers
c.
Anonymity
d.
Pseudonymous Servers
Feedback
Your answer is correct.