0% found this document useful (0 votes)
29 views8 pages

Quiz Ethics

The document consists of quizzes focused on ethics, corporate responsibility, and information technology security. It covers various topics such as the role of corporate ethics officers, the importance of a code of ethics, and the implications of unethical behavior in business practices. Additionally, it addresses security policies, types of malware, and the significance of compliance and duty of care in professional settings.

Uploaded by

knwati24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views8 pages

Quiz Ethics

The document consists of quizzes focused on ethics, corporate responsibility, and information technology security. It covers various topics such as the role of corporate ethics officers, the importance of a code of ethics, and the implications of unethical behavior in business practices. Additionally, it addresses security policies, types of malware, and the significance of compliance and duty of care in professional settings.

Uploaded by

knwati24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Quiz-1

1.The virtues ethics approach to decision making focuses on how one should behave and think about
relationships if he or she is concerned with his or her daily life in the community. True

2.A person who acts with integrity act in accordance with a personal code of principles. True

3. The term morality refers to social conventions about right and wrong that are so widely shared that
they become the basis for an established consensus. TRUE

4. A(n) corporate ethics officer aligns the practices of a workplace with the stated ethics and beliefs of
that workplace, holding people accountable to ethical standards. TRUE

A code of ethics is a statement that highlights its key ethical issues and identifies the overarching values
and principles that are important to the organization and its decision making.

TRUE

6. The principle that the ethical choice treats everyone the same and shows no favoritism or
discrimination is most closely associated with the fairness approach to dealing with moral issues. TRUE

7. The chairman of , an Indian based outsourcing firm, admitted he had overstated the company’s assets by
more than $1 billion in India’s largest ever corporate scandal. Satyam Computer Services

8. In a(n) morals assessment, an organization reviews how well it is meeting its ethical and social
responsibility goals and communicates its new goals for the upcoming year. False

9. Every society forms a set of rules that establishes the boundaries of generally accepted behavior.
These rules are often expressed in statements about how people should behave, and they fit together to
form the______ by which a society lives. moral code
10. The goodwill that socially responsible activities create can make it easier for corporations to conduct
their business. TRUE

11. Companies that develop and maintain strong employee relations: enjoy lower turnover rates

12. A corporate ethics officer provides an organization with ...........and leadership in the area of business
conduct. vision

13. The general public needs to develop a better understanding of the critical importance of ethics as
they apply to IT; currently, too much emphasis has been placed on technical issues. TRUE

14. The principle that the ethical choice treats everyone the same and shows no favoritism or
discrimination is most closely associated with the approach to dealing with moral issues.
fairness

15.In a(n)________, an organization reviews how well it is meeting its ethical and social responsibility
goals, and communicates its new goals for the upcoming year. Social audit

16............. is a system of rules that tells us what we can and cannot do. Law

17.Consistency means that shareholders, customers, suppliers, and the community know what they can
expect of an organization that it will behave in the future much as it has in the past. TRUE

18.A(n)_________is a habit of unacceptable behavior. vice

19.Greater globalization has increased the likelihood of unethical behavior. TRUE

20.An approach to ethical decision making that is based on a vision of society as a community whose
members work together to achieve a general set of values and goals is the________approach. Common
good

21.A complication of the________approach to decision making is that measuring and comparing the
values of certain benefits and costs is often difficult, if not impossible. utilitarian

22.The public reputation of an organization strongly influences the value of its stock, how consumers
regard its products and services, the degree of oversight it receives from government agencies, and the
amount of support and cooperation it receives from its business partners. TRUE

23.Which of the following is the most critical step in the decision-making process?

Development of a problem statement

24.Section 404 of the Sarbanes-Oxley Act states that.


annual reports must contain a statement signed by the CEO and CFO attesting that the
information in all of the firm’s SEC filings is accurate.

25.A set of beliefs about right and wrong behavior within a society is called ethics

26...............are one’s personal beliefs about right and wrong. Moral

27.A........provides an organization with vision and leadership in the area of business conduct.
Corporate ethics officer

28.__________is the concept that an organization should act ethically by taking accountability for the
impact of its actions on the environment, the community, and the welfare of its employees. Corporate
social responsibility

29.A code of ethics can gain company-wide acceptance unless it is developed with employee
participation and fully endorsed by the organization’s leadership. False

30.The .................................. is responsible for the careful and responsible management of an


organization. Board of directors

Quiz-2

1. Currently IT professional organization has emerged as preeminent, so there is universal code of


ethics for IT workers. FALSE

2.In the United States, a(n) government license gives permission to engage in an activity or operate a
business. TRUE

3.Compliance means to be in conformance with a profession’s core body of knowledge. FALSE

4.The United Nations Convention Against Corruption is a legally binding global treaty to fight bribery
and corruption.TRUE

5.To qualify legally as a bribe, the gift or payment must be made directly from donor to recipient

FALSE

6.A major goal for IT professionals and client is to develop good working relationships in which no
action can be perceived as unethical. FALSE
7. When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient
almost always coincide.FALSE

8.Bribery involves providing money, property, or favors to someone in business or government to obtain
a business advantage.TRUE

9.A bribe is a crime even if the payment was lawful under the laws of the foreign country in which it
was paid.FALSE

10.The core body of knowledge for any profession outlines an agreed-upon code of ethics and practices
for those who practice in that profession.FALSE

11.Vendor certifications require passing a written exam, which usually contains multiple-choice
questions because of legal concerns about whether other types of exams can be graded
objectively.TRUE

12.Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities,
in the opinion of the certifying organization.TRUE

13.A breach of the duty of care is defined as a failure to conform to the code of ethics of a professional
organization.FALSE

14.A(n) profession is a calling that requires specialized knowledge and often long and intensive
academic preparation.TRUE

15.A(n) trade secret is information used in a business, generally unknown to the public, that the
company has taken strong measures to keep confidential.TRUE

16.Misrepresentation is the misstatement or incomplete statement of a material fact. TRUE

17.Gifts come with no expectation of a future favor for the donor.TRUE

18.Professionals require advanced training and experience, must exercise discretion and judgment in the
course of their work, and their work cannot be standardized.TRUE

19. Certifications from associations generally require a certain level of experience and a broader
perspective than vendor certifications. industry

20. has been defined as not doing something that a reasonable person would do, or doing something
that a reasonable person would not do.Negligence

21. means to be in accordance with established policies, guidelines, specifications, or legislation.

Compliance
22.In relationships between IT professionals and .............. important issues include software piracy,
inappropriate use of IT resources, and inappropriate sharing of information.IT users

23.Most organizations have a(n) audit department whose primary responsibilities include
determining that internal systems and controls are adequate and effective. internal

24. is the crime of obtaining goods, services, or property through deception or trickery.Fraud

25.The Foreign Corrupt Practices Act (FCPA) makes it a crime to_______. bribe a foreign official

26. Government licensing is generally administered at the federal level in the United States.FALSE

27.From a legal perspective, there is both a reasonable person standard and a reasonable professional
standard to decide whether parties owe a duty of care. TRUE

28.Professionals' liability for injuries caused by their negligence is referred to as professional


malpractice.TRUE

29.From a legal perspective, IT workers are not recognized as professionals because they are not
licensed by the state or federal government.TRUE

30.Duty of care refers to the ................to protect people against any unreasonable harm or risk.
Obligation

Quiz-3
1. A security policy outlines exactly what needs to be done to safeguard computers and their data, but
not how it must be accomplished.

TRUE

2. Fraud by malicious insiders often involves some form of collusion, or cooperation, between an
employee and an outsider.

TRUE

3. The cooperation between an employee of a company and an outsider to commit fraud against the
company is called___.

collusion

4. Employees and contract workers must be educated about the importance of security so that they will
be motivated to understand and follow the security policies.
TRUE

5. A(n)----is a harmful program that resides in the active memory of the computer and duplicates itself.

worm

6. Debit and credit cards which contain a memory chip that is updated with encrypted data every time
the cards are used are called smart cards.

TRUE

7. A(n) Trojan horse is a form of malware in which malicious code is hidden inside a seemingly
harmless program.

TRUE

8. A spear-phishing attack typically employs a group of zombies to keep the target so busy responding
to a stream of automated requests that legitimate users cannot access the target.

FALSE

9. To initiate a denial of service attack, a tiny program is downloaded surreptitiously from the attacker’s
computer to dozens, hundreds, or even thousands of computers all over the world. Based on a command
by the attacker or at a preset time, the botnet computers, called---- , go into action, each sending a simple
request for access to the target site again and again.

zombies

10.Hacking to achieve a political or social goal is known as---

hacktivism

11.In a security incident, the primary goal must be to monitor and catch the intruder.

FALSE

12.An intrusion detection system monitors system and network resources and activities, and notifies the
network security when it detects attempts to circumvent the security measures of a networked computer
environment.

TRUE

13.Malicious insiders are poorly trained and inadequately managed employees who mean well but have
the potential to cause much damage.

FALSE
14.Rootkit is a set of programs that enables its users to gain administrator-level access to a computer
without the end user’s consent or knowledge.

TRUE

15.Using text messaging (SMS) fraudulently to try to get the recipient to reveal personal data is called

smishing

16.A(n)-----is a security incident prevention tool that evaluates whether an organization has a well-
considered security policy in place and if it is being followed.

Security audit

17.An attack on an information system that takes advantage of a vulnerability is called a(n)----

exploit

18.The use of voice mail to tell someone to call a phone number, or access a Web site, in an attempt to
gain personal information about that person is called .

vishing

19.Competitive Intelligence is the use of illegal means to obtain business information not available to
the general public.

FALSE

20.A large group of computers controlled from one or more remote locations by hackers without the
knowledge or consent of their owners is called a(n)

botnet

21.Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by
more skilled hackers.

TRUE

22.-----is legally obtained information gathered using sources available to the public.

Competitive intelligence

23.----------- is a method of computing that delivers secure, private, and reliable computing experiences
based on sound business practices.

Trustworthy computing
24. is the abuse of email systems to send unsolicited email to large numbers of people.

Email spam

25.The process of assessing security related risks from both internal and external threats to an
organization’s computers and networks is called ---
Risk assessment

26.----differ from viruses in that they propagate without human intervention, sending copies of
themselves to other computers by email.
Worms

27.Whenever possible, automated system rules should mirror an organization's written polices.
TRUE

28.Industrial espionage is the use of illegal means to obtain business information not available to the
general public.

TRUE

29.Crackers test the limitations of information systems out of intellectual curiosity to see whether they
can gain access and how far they can go.
FALSE

30.People who use illegal means to obtain trade secrets from a competitor are called industrial spies

TRUE

You might also like