0% found this document useful (0 votes)
165 views6 pages

Final 2022 - Ethics

Final 2022 - Ethics

Uploaded by

yousefazam120
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
165 views6 pages

Final 2022 - Ethics

Final 2022 - Ethics

Uploaded by

yousefazam120
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
2 4 ch 6. Zagazig University a Subject code: HUI02 ) cial, Eehical and Professtonal | \ ale Faculty of Computers & informatics Answer The Following Questions means to be in accordance with established policies, guidelines, speeifieations, oF legistation. Compliance b. Virtus ©, Feud 4. Professional is the crime of obtaining goods, services, or property through deception or trickery. ©. Fraud 4. Miscepresentation Conflict of interest’ 6, Breach of contract makes employees more aware of x company's code of ethics and how to apply it, as welt ‘as demonstrates that the company intends to operate in an ethical manner. a. Formal ethics training b. Social audit ¢. Problem definition d. Section 406 of the Sarbanes-Oxley Act Act of iegally making copies of software or enabling access to software to which they are not entitled . Business Software Alliance (BSA) d. Trade secrets @ Software piracy _b. Fraud consumers to request and obtain a free credit report once each year. Allows a. Fair Credit Reporting Act >, Fair and Accurate Credit Transactions Act ¢. Right to Financial Privacy Act d. Gramm-Leach-Bliley Act is the act of fraudulently using email to try to get the recipient to reveal personal ea b. Phishis : i 4. Flyposting data. ot do. 9. isa system of rules that tells us what we can and cann «. Vision and leadership & oe saeneieslly ©. Comporate social responsibility is a clear, concise description of the issue that needs to be addressed. 10. i i I audit a. Formal ethies training b. Social ¢. Problem definition : d. Common good approach 11. An) is a text file that a Web site can download to a visitor’s hard drive to identity visitors on subsequent visits. 4. Fair Information Practices b. Cookie €. Electronic Discovery 4d. Transborder data flow 12. is a federal law that assigns certain rights to parents regarding their children’s educational records. a. Children’s Online Privacy Protection Act. b. Health Insurance Portability and Accountability Act ¢. Family Educational Rights and Privacy Act 4. None of the above not doing something that a reasonable person would do, or doing something that a Teasonable person would not do a, Negligence b. Duty of care ©. Professional malpractice 4. Ethical Issues Software operates in a software layer that runs on top of the operating system and enables multiple virtual machines each with their own operating system to run on a single 13, c. Virtualization d. Cloud Computing imitations of information systems out of intellectual euriosity to see ss and how far they can go. ¢. Cyberterrorists d. Hacktivists ¢, Openness principle. d. Accountability. for a person to track the where abouts of someone else at all b, Stalking Apps 4. GPS. ‘without being monitored by other persons or nancial Privacy Act 20. To prot Sey im-Leach-Bliley Act 21, pabieall & VLC é. Antivirus "——_is the abus. ; Ries s the abuse of email systems to send unsolicited email to large numbers of people. b. Spam oc. Logic bombing SIA Gons 22. Und visi phe the provisions of. » healthcare providers must obtain written consent from * Prior to disclosing any information in their medical records, a. Gramm-Leach-Bliley b. Fair Credit Reporting c. HIPAA 4. USA PATRIOT 23. Which of the following is true about certification’? a. It guarantees the performance of an individual, _b, It can be applied to products. ©. It is a mandatory requirement by the law. d It is the same as licensing 24. A person who acts with integrity acts in accordance with a personal 5 a. Supply chain sustainability b, Code of principles ©. Morals d, Corporate social responsibility 25. The public. of an organization strongly influences the value of its stock, how consumers regard its products and services, the degree of oversight it receives from government agencies, and the amount of support and cooperation it receives from its business partners. a. Vision and leadership b, Reputation c. Comporate social responsibility d. Supply chain sustainability 26. is a harmful program that resides in the active memory of the computer and duplicates itself. a. Virus +b, Worm ¢, Trojan Horse 4. Spam 27. Opt-out policy is favored by a. Datacollectors b. Consumers. ——_c, Government d. None of the above y for electronic health records and offers protection for b. Electronic surveillance Act. d. All the above. nable harm or risk i d. Ethical Issues -an activity or operate a business d. Certification ; culture can, in turn, tea 31.A well-implemented ethics and compliance program and a strong ethical ‘ to__ isbehave and a decrease in observed misconduct , a. Decrease reporting of misconduct. b. Increase retaliation for reporting ©. Increa: essure on employees whistle blowing d. Less pressure on employ 32. Companies ti better emptoy a. Ga t develop .¢ relations enjoy lower turnoyer rates and "e morale, th ining the goodwill of the b. Fostering goo. nd mi strong employes considered as example on community xd business practices ©. Protecting the org anization and its employees from legal action 4: Avoiding unfavorable publicity 33, ___ isan example of virtues. a. Vanity b. Greed c. Envy a Generosity 34. Technically, a(n) __ —is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. 2. Virus b. Operating system c. Zombie d. CAPTCHA 35, An individual has the right to know data must be collected for clearly is or her personal data is being collected, and any stated, legitimate purposes. a. Choices b. Correction ©. Security d. Notice 36. a device that records the ori inating number of incoming calls for a Particular phone number. a, Pen register b. Trap and trace ¢. Wiretap a.NSL. 37.4 attack keeps the tai that legitimate users cannot get in, a. Spam b. Rootkit . Logie bomb is the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization. irget so busy responding to a stream of automated requests d. Distributed denial-of-service 38. a. Spamdexing b. Vishing c. Smishing 4. Spear-phishing 39. A(n) takes places before the security community or software developer knows about the vulnerability or has been able to repair it. a.Zero-day attack _b. Botnet c. Exploit d. CAPTCHA 40. From the responsibilities of are creating and maintaining the ethics culture and responsibility for compliance. ’ i tive officer (CEO) b. The ethics officer = ie re ai { d. The chief information officer (CIO) i? ge 4 of 6 41. {eT ae authority by suey meang t85 attempts by People to 1 « Preteating Rae, =" heron ate ae ; fe © Safeguards Rule b. Financia Privacy Rute 4, None of 42, After the solution to aa desired effect fee stakeholders, a. Develops problem ‘statement, b. c. Implement decision Danaea 43, ~ focuses on with your daily life in Utilitarian approach ©. Virtue ethies approach '* personal information without proper FOF phishing. m has been implemented, Saficice plemented, monitor the results to see if the sch nnd observe its impact on the organtzation mad the arlene how you should behave and think about relationships if you are concerned A community, ». Fairness approach 4. Common good approach 44, is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making ‘8. Code of ethics b. Corporates social responsibility c. The Sarbanes-Oxley Act d. Conducting Social Audits 45. Theterm___refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus. a, Morality b. Virtues ©. Ethics 4. Code of principles 46. A(n) enables an organization to review how well it is meeting its ethical and social responsibility goals, and communicate new goals for the upcoming year. . Social audit d. Section 406 of the Sarbanes-Oxley Act employee to attract attention to a negligent, illegal, unethical, ch statement is True or Fals $0. Certification indicates that a professio Dossesses a particular set of skills, knowl ies, in the opinion of the certifying organization, ee: 51. Computer viruses differ from worms in that viruses ean propagate without human intervention, often sending copies of themselves to other computers by email, ’ $2. Trojan horse has become an umbrella term for many types of malicious eode. the perceptions of the donor and 53. When it comes to distinguishing between bribes and gifts, recipient almost always coincide. 54. The European philosophy of addressing privacy concerns employs strict government regulation, including enforcement by a set of commissioners; it differs greatly from the US. philosophy of having no federal privacy policy. 55. Vendor certifications require passing a written exam, which usually contains multiple-choice questions because of legal concerns about whether other types of exams can be graded objectively. 56. The Business Software Alliance (BSA) is a trade group that represents the world’s largest software and hardware manufacturers. 57. A. spear-phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target. 58. Rootkit is a set of programs that enables its users to gain administrator-level access to a computer without the end user’s consent or knowledge. training and experience, must exercise discretion and judgment mer aa their work cannot be standardized. iain

You might also like