0 ratings0% found this document useful (0 votes) 165 views6 pagesFinal 2022 - Ethics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
2
4
ch
6.
Zagazig University a
Subject code: HUI02 )
cial, Eehical and Professtonal | \ ale
Faculty of Computers & informatics
Answer The Following Questions
means to be in accordance with established policies, guidelines, speeifieations, oF
legistation.
Compliance b. Virtus ©, Feud 4. Professional
is the crime of obtaining goods, services, or property through deception or trickery.
©. Fraud 4. Miscepresentation
Conflict of interest’ 6, Breach of contract
makes employees more aware of x company's code of ethics and how to apply it, as welt
‘as demonstrates that the company intends to operate in an ethical manner.
a. Formal ethics training b. Social audit
¢. Problem definition d. Section 406 of the Sarbanes-Oxley Act
Act of iegally making copies of software or enabling access to software to which they are
not entitled
. Business Software Alliance (BSA) d. Trade secrets
@ Software piracy _b. Fraud
consumers to request and obtain a free credit report once each year.
Allows
a. Fair Credit Reporting Act >, Fair and Accurate Credit Transactions Act
¢. Right to Financial Privacy Act d. Gramm-Leach-Bliley Act
is the act of fraudulently using email to try to get the recipient to reveal personal
ea
b. Phishis : i 4. Flyposting
data.ot do.
9. isa system of rules that tells us what we can and cann
«. Vision and leadership & oe saeneieslly
©. Comporate social responsibility
is a clear, concise description of the issue that needs to be addressed.
10. i
i I audit
a. Formal ethies training b. Social
¢. Problem definition : d. Common good approach
11. An) is a text file that a Web site can download to a visitor’s hard drive to identity
visitors on subsequent visits.
4. Fair Information Practices b. Cookie
€. Electronic Discovery 4d. Transborder data flow
12. is a federal law that assigns certain rights to parents regarding their children’s
educational records.
a. Children’s Online Privacy Protection Act.
b. Health Insurance Portability and Accountability Act
¢. Family Educational Rights and Privacy Act
4. None of the above
not doing something that a reasonable person would do, or doing something that a
Teasonable person would not do
a, Negligence b. Duty of care
©. Professional malpractice 4. Ethical Issues
Software operates in a software layer that runs on top of the operating system and
enables multiple virtual machines each with their own operating system to run on a single
13,
c. Virtualization d. Cloud Computing
imitations of information systems out of intellectual euriosity to see
ss and how far they can go.
¢. Cyberterrorists
d. Hacktivists
¢, Openness principle. d. Accountability.
for a person to track the where abouts of someone else at all
b, Stalking Apps
4. GPS.
‘without being monitored by other persons ornancial Privacy Act
20. To prot
Sey im-Leach-Bliley Act
21, pabieall & VLC é. Antivirus
"——_is the abus. ;
Ries s the abuse of email systems to send unsolicited email to large numbers of people.
b. Spam oc. Logic bombing SIA Gons
22. Und visi
phe the provisions of. » healthcare providers must obtain written consent from
* Prior to disclosing any information in their medical records,
a. Gramm-Leach-Bliley b. Fair Credit Reporting
c. HIPAA 4. USA PATRIOT
23. Which of the following is true about certification’?
a. It guarantees the performance of an individual, _b, It can be applied to products.
©. It is a mandatory requirement by the law. d It is the same as licensing
24. A person who acts with integrity acts in accordance with a personal 5
a. Supply chain sustainability b, Code of principles
©. Morals d, Corporate social responsibility
25. The public. of an organization strongly influences the value of its stock, how consumers
regard its products and services, the degree of oversight it receives from government agencies, and
the amount of support and cooperation it receives from its business partners.
a. Vision and leadership b, Reputation
c. Comporate social responsibility d. Supply chain sustainability
26. is a harmful program that resides in the active memory of the computer and
duplicates itself.
a. Virus +b, Worm ¢, Trojan Horse 4. Spam
27. Opt-out policy is favored by
a. Datacollectors b. Consumers. ——_c, Government d. None of the above
y for electronic health records and offers protection for
b. Electronic surveillance Act.
d. All the above.
nable harm or risk
i d. Ethical Issues
-an activity or operate a business
d. Certification; culture can, in turn, tea
31.A well-implemented ethics and compliance program and a strong ethical ‘
to__ isbehave and a decrease in observed misconduct ,
a. Decrease reporting of misconduct. b. Increase retaliation for reporting
©. Increa:
essure on employees
whistle blowing d. Less pressure on employ
32. Companies ti
better emptoy
a. Ga
t develop .¢ relations enjoy lower turnoyer rates and
"e morale, th
ining the goodwill of the
b. Fostering goo.
nd mi strong employes
considered as example on
community
xd business practices
©. Protecting the org
anization and its employees from legal action
4: Avoiding unfavorable publicity
33, ___ isan example of virtues.
a. Vanity b. Greed c. Envy a Generosity
34. Technically, a(n) __ —is a piece of programming code, usually disguised as something
else, that causes a computer to behave in an unexpected and usually undesirable manner.
2. Virus b. Operating system c. Zombie d. CAPTCHA
35, An individual has the right to know
data must be collected for clearly
is or her personal data is being collected, and any
stated, legitimate purposes.
a. Choices b. Correction ©. Security d. Notice
36. a device that records the ori inating number of incoming calls for a Particular phone
number.
a, Pen register b. Trap and trace ¢. Wiretap a.NSL.
37.4 attack keeps the tai
that legitimate users cannot get in,
a. Spam b. Rootkit . Logie bomb
is the sending of fraudulent emails to an organization's employees designed to look
like they came from high-level executives from within the organization.
irget so busy responding to a stream of automated requests
d. Distributed denial-of-service
38.
a. Spamdexing b. Vishing c. Smishing 4. Spear-phishing
39. A(n) takes places before the security community or software developer knows about
the vulnerability or has been able to repair it.
a.Zero-day attack _b. Botnet c. Exploit d. CAPTCHA
40. From the responsibilities of are creating and maintaining the ethics culture and
responsibility for compliance. ’
i tive officer (CEO) b. The ethics officer
= ie re ai { d. The chief information officer (CIO)
i?
ge 4 of 641.
{eT ae
authority by suey meang t85 attempts by People to 1
« Preteating Rae, =" heron ate ae
; fe
© Safeguards Rule b. Financia Privacy Rute
4, None of
42, After the solution to aa
desired effect fee
stakeholders,
a. Develops problem
‘statement, b.
c. Implement decision Danaea
43, ~ focuses on
with your daily life in
Utilitarian approach
©. Virtue ethies approach
'* personal information without proper
FOF phishing.
m has been implemented,
Saficice plemented, monitor the results to see if the
sch nnd observe its impact on the organtzation mad the arlene
how you should behave and think about relationships if you are concerned
A community,
». Fairness approach
4. Common good approach
44, is a statement that highlights an organization's key ethical issues and identifies the
overarching values and principles that are important to the organization and its decision making
‘8. Code of ethics b. Corporates social responsibility
c. The Sarbanes-Oxley Act d. Conducting Social Audits
45. Theterm___refers to social conventions about right and wrong that are so widely shared
that they become the basis for an established consensus.
a, Morality b. Virtues ©. Ethics 4. Code of principles
46. A(n) enables an organization to review how well it is meeting its ethical and social
responsibility goals, and communicate new goals for the upcoming year.
. Social audit
d. Section 406 of the Sarbanes-Oxley Act
employee to attract attention to a negligent, illegal, unethical,ch statement is True or Fals
$0. Certification indicates that a professio
Dossesses a particular set of skills, knowl ies,
in the opinion of the certifying organization, ee:
51. Computer viruses differ from worms in that viruses ean propagate without human intervention,
often sending copies of themselves to other computers by email, ’
$2. Trojan horse has become an umbrella term for many types of malicious eode.
the perceptions of the donor and
53. When it comes to distinguishing between bribes and gifts,
recipient almost always coincide.
54. The European philosophy of addressing privacy concerns employs strict government
regulation, including enforcement by a set of commissioners; it differs greatly from the US.
philosophy of having no federal privacy policy.
55. Vendor certifications require passing a written exam, which usually contains multiple-choice
questions because of legal concerns about whether other types of exams can be graded
objectively.
56. The Business Software Alliance (BSA) is a trade group that represents the world’s largest
software and hardware manufacturers.
57. A. spear-phishing attack typically employs a group of zombies to keep the target so busy
responding to a stream of automated requests that legitimate users cannot access the target.
58. Rootkit is a set of programs that enables its users to gain administrator-level access to a computer
without the end user’s consent or knowledge.
training and experience, must exercise discretion and judgment
mer aa their work cannot be standardized.
iain