IT Prelim Exam Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Anthzila
A
Anthzila
Community Contributor
Quizzes Created: 35 | Total Attempts: 45,253
| Attempts: 1,666 | Questions: 50
Please wait...
Question 1 / 50
0 %
0/100
Score 0/100
1. ________ is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.

Explanation

A Code of Ethics is a statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making. It serves as a guide for employees and stakeholders to understand the moral standards and conduct expected within the organization. It outlines the organization's commitment to integrity, honesty, fairness, and responsibility in its operations and interactions with others. The Code of Ethics helps establish a strong ethical culture within the organization and provides a framework for ethical decision making in various situations.

Submit
Please wait...
About This Quiz
IT Prelim Exam Quiz - Quiz

.

Are you ready to test your knowledge with our ' IT prelim exam quiz'? The questions touch on the IT industry's basics, morality & ethics, and technicalities.... see moreThink you can answer them all correctly? Get ready to put your knowledge to the test! You are expected to attempt to answer all the questions to get a high score. Think you can do it? Get ready to brush up on your knowledge with the quiz! Read the question carefully before picking your option. Our quiz can also help you prepare for higher-level IT examinations! Have fun and keep learning. see less

2. _________ forces unwanted and often objectionable materials into e-mail boxes that detracts the ability of internet users to communicate effectively.

Explanation

Spam refers to the act of sending unsolicited and often irrelevant or objectionable emails to a large number of recipients. This practice hampers the ability of internet users to communicate effectively as it overwhelms their email boxes with unwanted messages, making it difficult to find and prioritize important emails. Therefore, spam fits the description provided in the question and is the correct answer.

Submit
3. ___________ provides an organization with vision and leadership in the area of business conduct.

Explanation

A corporate ethics officer is responsible for providing an organization with vision and leadership in the area of business conduct. They ensure that the organization operates ethically and in compliance with laws and regulations. They develop and implement policies and procedures to promote ethical behavior, conduct training programs, and monitor and enforce ethical standards. By taking on this role, the corporate ethics officer helps to create a culture of integrity and accountability within the organization.

Submit
4. Which of the following statements is true about creating an ethical work environment?

Explanation

Creating an ethical work environment is important because it fosters a positive and supportive atmosphere for employees to work efficiently. When employees feel that they are working in an ethical environment, they are more likely to feel valued and motivated, leading to increased productivity and job satisfaction. In such an environment, employees are encouraged to uphold high moral and ethical standards, which promotes teamwork, trust, and respect among colleagues. This ultimately contributes to the overall success and well-being of both the employees and the organization.

Submit
5. ______________ is the practice of illegally making copies of software of enabling others to access without authority.

Explanation

Software piracy refers to the illegal act of making unauthorized copies of software or enabling others to access software without proper authorization. This can involve activities such as downloading or sharing copyrighted software without permission, cracking or bypassing software licensing protections, or selling counterfeit copies of software. Software piracy is a serious issue that can result in financial losses for software developers and can also lead to security risks for users who unknowingly download compromised or counterfeit software.

Submit
6. _______  is a system of rules that tells us what we can and cannot do.

Explanation

Law is a system of rules that governs and regulates the behavior of individuals and societies. It provides a framework that outlines what actions are permissible and those that are not. Laws are enforced by the government and failure to comply with them can result in legal consequences. This distinguishes law from ethics, which are moral principles that guide individual behavior but are not necessarily enforceable by law. Morals, on the other hand, are personal beliefs about what is right and wrong. Policies are guidelines or principles adopted by organizations or institutions to achieve specific goals.

Submit
7. A bid was done to select contractors to create a government building in the city.  in order to get a favorable stance to win the bid, a participating contractor gave a million peso cash gift to the bidding officers.  What form of trickery that the contractor have done?

Explanation

The contractor engaged in bribery by giving a million peso cash gift to the bidding officers in order to gain a favorable stance and increase their chances of winning the bid for the government building project. This act of offering a bribe is a form of trickery and unethical behavior, as it involves the exchange of money to influence the decision-making process in one's favor.

Submit
8. A virus does not spread itself from computer to computer but must be spread through infected e-mail document attachments, infected programs, or infected websites.

Explanation

This statement is true because viruses cannot spread on their own. They need a medium to spread, such as infected email attachments, programs, or websites. Without any of these mediums, a virus cannot infect other computers.

Submit
9. What is the mission of the Business Software Alliance?

Explanation

The mission of the Business Software Alliance is to stop the illegal copying of software to its members. This means that the organization aims to prevent the unauthorized duplication and distribution of software, protecting the rights and intellectual property of software creators and vendors.

Submit
10. After the solution of the problem is implemented, monitor the results to see if the desired effect was achieved.  This step in the decision-making process is referred to as _______.

Explanation

After implementing the solution to a problem, it is important to monitor the results to determine if the desired effect was achieved. This step in the decision-making process is known as "Evaluate Results." It involves assessing the outcomes of the decision and comparing them to the intended goals or objectives. By evaluating the results, one can determine the effectiveness of the decision and make any necessary adjustments or improvements.

Submit
11. During this stage in decision making, it is ideal to enlist th help of others, including stakeholders to identify several alternatives.  This decision making step is known as ________.

Explanation

During the stage of decision making where it is ideal to enlist the help of others, including stakeholders, to identify several alternatives, it is referred to as "Identify Alternatives." This step involves brainstorming and considering different options that could potentially solve the problem or achieve the desired outcome. By involving others, a wider range of perspectives and ideas can be gathered, leading to a more comprehensive list of alternatives to evaluate and choose from.

Submit
12. __________ highlights an organization's key ethical issues and identifies overarching values and principles that are important to the organization and its decision-making process.

Explanation

A code of ethics is a set of guidelines or principles that outline the moral and ethical standards and behaviors expected from individuals within an organization. It serves as a framework for decision-making and helps identify and address key ethical issues that may arise. By highlighting an organization's key ethical issues and identifying overarching values and principles, a code of ethics plays a crucial role in guiding the organization's decision-making process and ensuring that it operates in an ethical and responsible manner.

Submit
13. What makes a good problem statement?

Explanation

A good problem statement is one that prompts individuals to consider the consequences and significance of a specific problem. It encourages critical thinking and analysis, pushing individuals to delve deeper into the issue at hand. By emphasizing the importance of understanding the impact of a problem, a good problem statement can motivate individuals to work towards finding effective solutions.

Submit
14. A person who acts with _______ acts in accordance with a personal code of principles.

Explanation

A person who acts with integrity acts in accordance with a personal code of principles. Integrity refers to the quality of being honest, having strong moral principles, and adhering to a set of values. It involves consistently behaving in a trustworthy and ethical manner, regardless of external circumstances or pressures. Acting with integrity means staying true to one's beliefs and values, even when faced with difficult decisions or temptations. It is a reflection of one's character and a fundamental aspect of personal and professional behavior.

Submit
15. _______ refers to the social conventions about right and wrong.

Explanation

Morality refers to the social conventions about right and wrong. It encompasses the principles and values that guide individuals and societies in determining what is considered morally acceptable behavior. It involves distinguishing between good and bad actions, and making decisions based on ethical standards and the impact on others. Morality is a fundamental aspect of human behavior and plays a crucial role in shaping individual and collective actions.

Submit
16. A ______ is a moral habit that inclines people to do what is considered acceptable.

Explanation

A virtue is a moral habit that inclines people to do what is considered acceptable. It is a positive character trait or quality that guides individuals to act morally and ethically. Virtues are seen as desirable and admirable qualities that promote good behavior and contribute to a harmonious society. By possessing virtues, individuals are more likely to make choices that align with accepted moral standards and principles.

Submit
17. In a __________, an organization reviews how well it is meeting its ethical and social responsibility goals and communicates its new goals for the upcoming year.

Explanation

A social audit is a process where an organization assesses its performance in terms of ethical and social responsibility goals. It allows the organization to evaluate its actions and impact on society, identify areas for improvement, and communicate its new goals for the upcoming year. This helps the organization to be accountable to its stakeholders and ensure transparency in its operations.

Submit
18. Which of the following holds true about Ethics Tranining?

Explanation

Ethics training is designed to make employees aware of a company's code of ethics. It helps employees understand the ethical standards and guidelines that they are expected to follow in the workplace. This training aims to promote ethical behavior and integrity among employees, ensuring that they are aware of the company's values and principles. It is an important step in creating a positive work environment and preventing unethical practices.

Submit
19. A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is __________.

Explanation

A group of computers controlled centrally from one or more remote locations by hackers without the knowledge of their owners is referred to as a botnet. In a botnet, the computers are infected with malicious software that allows the hackers to control them and use them for various purposes, such as sending spam emails, launching DDoS attacks, or stealing sensitive information. This centralized control gives the hackers significant power and control over the compromised computers, making botnets a serious threat to cybersecurity.

Submit
20. The principles and core values that are essential to the work of a particular occupational group is known as ____________.

Explanation

A code of ethics refers to the principles and core values that guide the behavior and decision-making of individuals within a specific occupational group. It outlines the moral responsibilities and standards of conduct that members of the group are expected to adhere to in their professional practice. This code serves as a framework for promoting ethical behavior, maintaining professional integrity, and ensuring the well-being of clients or stakeholders. It helps to establish trust and credibility within the profession and provides a basis for resolving ethical dilemmas or conflicts that may arise in the course of work.

Submit
21. To date, there are no documented cases of cyberterrorism.

Explanation

The statement suggests that there have been no recorded instances of cyberterrorism up until now. However, this is not true. There have been several documented cases of cyberterrorism, where individuals or groups have used cyber attacks to cause harm, disruption, or fear for political or ideological reasons. These attacks have targeted various sectors such as government, infrastructure, and financial systems. Therefore, the correct answer is false, as there have indeed been documented cases of cyberterrorism.

Submit
22. What is expected of professionals to act in society?

Explanation

Professionals are expected to act in society in a way that causes no harm, provides significant benefits, and establishes and maintains professional standards that protect the public. This means that professionals should not engage in actions that could negatively impact society, but instead should contribute positively by offering valuable services or expertise. Additionally, they have a responsibility to adhere to ethical guidelines and standards that ensure the safety and well-being of the public they serve. Therefore, the correct answer is "all of the above."

Submit
23. ______________ has been defined as not doing something that a reasonable person would do or something that a reasonable person would not do.

Explanation

Negligence refers to the failure to take reasonable care or do something that a reasonable person would do, or doing something that a reasonable person would not do. It implies a lack of responsibility or attention, resulting in harm or damage to others. Negligence can occur in various contexts, such as personal injury cases, medical malpractice, or even in everyday situations where someone's actions or inactions cause harm to others. It is a legal concept that holds individuals accountable for their actions or lack thereof when they fail to meet the standard of care expected of them.

Submit
24. The process of generating a number of alternative solutions to a problem.

Explanation

Brainstorming is a process that involves generating a number of alternative solutions to a problem. It is a technique used to encourage creativity and innovation by allowing individuals or a group to freely express their ideas and suggestions without judgment or criticism. During brainstorming, participants are encouraged to think outside the box and come up with as many ideas as possible, which can then be evaluated and refined to find the best solution to the problem at hand.

Submit
25. The written statement that defines an organization's security requirements, as well as the controls and sanctions used to meet those requirements, is known as ____.

Explanation

A security policy is a written statement that defines an organization's security requirements, as well as the controls and sanctions used to meet those requirements. It outlines the guidelines and procedures that need to be followed to ensure the security of an organization's assets, systems, and information. It helps in establishing a framework for managing and mitigating security risks and ensures that everyone within the organization understands their responsibilities in maintaining a secure environment.

Submit
26. _________ is a set of beliefs about right and wrong behavior within a society.

Explanation

Ethics refers to a set of beliefs about right and wrong behavior within a society. It encompasses the principles and values that guide individuals and organizations in making moral decisions and conducting themselves ethically. Ethics helps individuals distinguish between what is morally acceptable and what is not, and it provides a framework for evaluating the consequences and implications of their actions. It is a fundamental aspect of human behavior and plays a crucial role in shaping social norms and promoting a just and fair society.

Submit
27. The crime of obtaining goods, services or property through deception and trickery is __________.

Explanation

The correct answer is "Fraud." Fraud refers to the act of obtaining goods, services, or property through deception and trickery. It involves intentionally deceiving others for personal gain, typically involving financial or material benefits. Fraud can take various forms, such as identity theft, insurance fraud, or credit card fraud. It is considered a criminal offense and is punishable by law.

Submit
28. ____________ is a clear, concise description of the issue that needs to be addressed.

Explanation

The correct answer is problem statement because it is a clear and concise description of the issue that needs to be addressed. A problem statement helps to define the problem and provide a focus for finding a solution. It identifies the gap between the current state and the desired state, allowing organizations to prioritize and allocate resources effectively. By clearly articulating the problem, it becomes easier to develop strategies and action plans to resolve it.

Submit
29. Software that generates and grades test that humans can pass but that all but the most sophisticated computer programs cannot call _________.

Explanation

A CAPTCHA is a type of software that generates and grades tests that humans can pass but most computer programs cannot. It is designed to distinguish between humans and automated bots. CAPTCHAs typically involve visual or auditory challenges that require human perception and understanding, such as identifying distorted letters or solving simple puzzles. This helps prevent automated programs from accessing certain websites or services, ensuring the security and integrity of online systems.

Submit
30. Once the alternative is selected, it should be implemented in an efficient, effective, and timely manner.  This step in decision-making process is referred to as ________.

Explanation

The step in the decision-making process referred to as "Implement Decision" involves putting the chosen alternative into action. It requires executing the decision in a manner that is efficient, effective, and timely. This step is crucial as it ensures that the decision is not only made but also implemented successfully, leading to the desired outcome.

Submit
31. __________ is a method of computing that delivers secure, private, and reliable computing experiences.

Explanation

Trustworthy computing is a method of computing that focuses on delivering secure, private, and reliable computing experiences. This approach ensures that users can trust the technology they are using, as it prioritizes security and privacy measures. Trustworthy computing involves implementing robust security protocols, protecting user data, and ensuring the reliability of the systems and services provided. By prioritizing trustworthiness, this method aims to enhance user confidence and overall computing experiences.

Submit
32. A professional is someone who:

Explanation

A professional is someone who requires advanced training and experience, as they need to possess specialized knowledge and skills in their field. They must also exercise discretion and judgment in their work, as they often have to make important decisions and solve complex problems. Additionally, professionals typically perform work that cannot be standardized, meaning that it requires individual expertise and tailored approaches. Therefore, the correct answer is "all of the above" as all the given statements accurately describe the characteristics of a professional.

Submit
33. The policies of our school such as attendance and grades policies are examples of ________.

Explanation

The policies of our school, such as attendance and grades policies, are examples of laws. Laws are a set of rules and regulations that are enforced by an authority to maintain order and ensure compliance. In the context of a school, these policies are put in place to govern the behavior and performance of students, similar to how laws govern the behavior of citizens in a society.

Submit
34. __________ is responsible for the careful and responsible management of an organization.

Explanation

The Board of Directors is responsible for the careful and responsible management of an organization. They are a group of individuals elected or appointed to represent the shareholders and make important decisions on behalf of the organization. The board sets the overall strategic direction, monitors the performance of the organization, and ensures that it operates in the best interest of its stakeholders. They also hire and evaluate the CEO and other top executives, ensuring that the organization is led by competent and effective leaders.

Submit
35. _________ means that employees know what is expected of them, and they can employ the organizational values to help them in their decision making.

Explanation

Consistency means that employees have a clear understanding of their roles and responsibilities within the organization. They are aware of what is expected of them and can use the organization's values as a guide in their decision-making processes. This ensures that employees are aligned with the organization's goals and can make consistent choices that are in line with its values.

Submit
36. ____________ is a process that oneundertakes voluntarily to prove competency is a set of skills.

Explanation

Certification is a process that one undertakes voluntarily to prove competency in a set of skills. Unlike licensing, which is typically required by law and regulated by a government agency, certification is usually optional and administered by a professional organization or association. Registering, on the other hand, refers to the act of entering one's name or information on an official list or record. Therefore, the correct answer is certification, as it aligns with the voluntary nature of the process described in the question.

Submit
37. Choose the letters the fills the blanks of the following question. The corporate ethics officer provides the organization with __________ and _________ in the area of business conduct.

Explanation

The corporate ethics officer plays a crucial role in providing the organization with guidance and direction in terms of business conduct. They are responsible for setting the vision and goals for ethical behavior within the company, ensuring that all employees understand and adhere to these standards. Additionally, they provide leadership by serving as a role model for ethical behavior and promoting a culture of integrity throughout the organization. Overall, the corporate ethics officer helps to establish trust and respect within the company by ensuring that ethical principles are at the forefront of decision-making and actions.

Submit
38. A set of programs that enables a hacker to gain administrative level access to a computer without the end user's consent or knowledge is called _______.

Explanation

A rootkit is a set of programs that allows a hacker to gain unauthorized access to a computer system without the knowledge or consent of the user. It is designed to hide its presence and provide administrative-level access, enabling the hacker to perform malicious activities without being detected. Unlike other options like a Trojan horse, logic bomb, or worm, a rootkit specifically focuses on covertly gaining control over a system and maintaining persistent access.

Submit
39. A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is called cyberterrorism.

Explanation

The given statement is false. A person who attacks computers and information systems in order to capture trade secrets and gain a competitive advantage is not called cyberterrorism. Cyberterrorism refers to the use of cyber attacks by individuals or groups to create fear, panic, or disrupt society for political, ideological, or religious reasons. The scenario described in the statement is more aligned with cyber espionage or cybercrime rather than cyberterrorism.

Submit
40. A type of attacker that is extremely difficult to detect or stop because he or she is often authorized to access the very systems besing abused is called a ___________.

Explanation

A malicious insider refers to an attacker who is authorized to access the systems being abused. This individual is difficult to detect or stop because they have legitimate access to the systems, making it challenging to distinguish their malicious activities from regular usage. They can exploit their authorized privileges to carry out attacks, potentially causing significant damage or data breaches.

Submit
41. An attack on an information system that takes advantage of a vulnerability is called an _______.

Explanation

An attack on an information system that takes advantage of a vulnerability is called an exploit. Exploits are a type of cyber attack where attackers identify and target weaknesses or vulnerabilities in a system, such as software bugs or misconfigurations, to gain unauthorized access or control over the system. Exploits can be used to steal sensitive information, disrupt system functionality, or launch further attacks. They are often used by hackers to exploit known vulnerabilities in order to infiltrate and compromise computer systems or networks.

Submit
42. Statements about how people should behave fit together to form the ___________ by which a society lives.

Explanation

Ethical standards and moral code both refer to a set of principles or beliefs that guide individual behavior. However, "moral code" specifically emphasizes the social aspect, suggesting that these principles are collectively shared and agreed upon by a society. This term implies a broader and more comprehensive framework of values and norms that shape the way people should behave in order to maintain a harmonious and functioning society. "Rules and regulations" may also play a role in governing behavior, but they are more specific and often enforced by external authorities, whereas a moral code is internalized and upheld by individuals within a society.

Submit
43. Although end-users often get the blame when it comes to using illegal copies of commercial software, software piracy is a corporate setting is sometimes directly traceable to _______.

Explanation

Software piracy in a corporate setting can sometimes be directly traceable to the IT staff. IT staff members have access to the company's software systems and can easily make unauthorized copies or distribute illegal copies of commercial software. They may do this for personal gain or to meet the demands of other employees. It is important for companies to have strict policies and security measures in place to prevent such activities and ensure that software is used legally.

Submit
44. Reporting a trade secret is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest.

Explanation

Reporting a trade secret is not an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest. Trade secrets are confidential information that provide a company with a competitive advantage and disclosing them can be illegal and harmful to the company. Therefore, reporting a trade secret would not be considered a way to address unethical or dangerous acts by a company.

Submit
45. Which of the following is an activity on how companies gain goodwill in society?

Explanation

Donating computers to public schools and giving scholarship grants to potential students are activities that contribute to the betterment of society and enhance a company's reputation. These actions demonstrate corporate social responsibility by investing in education and supporting the development of individuals. On the other hand, improper waste disposal and giving jobs to farmers to cut trees for supply can have negative impacts on the environment and society, which would not contribute to gaining goodwill.

Submit
46. The process of assessing security-related risks from both internal and external threats to an organization's computers and networks is called ________

Explanation

Risk assessment is the process of evaluating and analyzing potential security-related risks that can affect an organization's computers and networks. It involves identifying and assessing both internal and external threats to determine the likelihood and impact of these risks. By conducting a risk assessment, organizations can identify vulnerabilities, prioritize risks, and implement appropriate controls and mitigation strategies to protect their systems and data.

Submit
47. Dell was at one time the largest personal manufacturer in the world.  But in 2007, a judge found that Dell failed to provide the time-on-site technical support that customers were entitled to, which frustrated customers seeking support through long wait times and frequent transfers.  Dell failed to deliver the promise of quality support.  Which of the following reasons for fostering good business ethics best describes the story?

Explanation

The story of Dell failing to provide quality support to its customers highlights the importance of fostering good business practices. By failing to deliver on their promise of quality support, Dell not only frustrated its customers but also damaged its reputation. Fostering good business practices involves ensuring that customers' needs are met, providing reliable and consistent services, and upholding ethical standards. This helps to build trust and loyalty among customers and avoids unfavorable publicity, ultimately contributing to the success and sustainability of the organization.

Submit
48. Which of the following is true about why fostering good business ethics is important?

Explanation

Fostering good business ethics is important because it helps in gaining the goodwill of the community. When a company operates ethically, it builds a positive reputation and trust among the community members, which can lead to increased customer loyalty and support. Additionally, it also helps in avoiding unfavorable publicity. Unethical practices can damage a company's reputation and lead to negative publicity, which can have long-term consequences for the business. By prioritizing good business ethics, a company can maintain a positive image and avoid potential backlash from the public.

Submit
49. ___________ makes employees more aware of the company's code of ethics and how to apply it, as well as demonstrates that the company intends to operate in an ethical manner.

Explanation

The correct answer is problem definition. Problem definition is a process that helps employees understand the ethical standards and guidelines set by the company. It also demonstrates the company's commitment to operating in an ethical manner. By defining the problems and challenges faced by the organization, employees become more aware of the code of ethics and how to apply it in their work. This promotes a culture of ethics within the company and ensures that employees understand the importance of ethical behavior in their day-to-day activities.

Submit
50. A device that works to prevent an attack by blocking viruses, malformed packets and other threats from getting into the company network is called a _______.

Explanation

An intrusion prevention system is a device that actively works to prevent attacks by blocking viruses, malformed packets, and other threats from entering the company network. Unlike an intrusion detection system, which only detects and alerts about potential attacks, an intrusion prevention system takes proactive measures to stop these threats from infiltrating the network. This helps to ensure the security and integrity of the company's network by actively blocking and mitigating potential attacks.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 28, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 28, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 06, 2011
    Quiz Created by
    Anthzila
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
________ is a statement that highlights an organization's key...
_________ forces unwanted and often objectionable materials into...
___________ provides an organization with vision and leadership in the...
Which of the following statements is true about creating an ethical...
______________ is the practice of illegally making copies of software...
_______  is a system of rules that tells us what we can and...
A bid was done to select contractors to create a government building...
A virus does not spread itself from computer to computer but must be...
What is the mission of the Business Software Alliance?
After the solution of the problem is implemented, monitor the results...
During this stage in decision making, it is ideal to enlist th help of...
__________ highlights an organization's key ethical issues and...
What makes a good problem statement?
A person who acts with _______ acts in accordance with a personal code...
_______ refers to the social conventions about right and wrong.
A ______ is a moral habit that inclines people to do what is...
In a __________, an organization reviews how well it is meeting its...
Which of the following holds true about Ethics Tranining?
A group of computers controlled centrally from one or more remote...
The principles and core values that are essential to the work of a...
To date, there are no documented cases of cyberterrorism.
What is expected of professionals to act in society?
______________ has been defined as not doing something that a...
The process of generating a number of alternative solutions to a...
The written statement that defines an organization's security...
_________ is a set of beliefs about right and wrong behavior within a...
The crime of obtaining goods, services or property through deception...
____________ is a clear, concise description of the issue that needs...
Software that generates and grades test that humans can pass but that...
Once the alternative is selected, it should be implemented in an...
__________ is a method of computing that delivers secure, private, and...
A professional is someone who:
The policies of our school such as attendance and grades policies are...
__________ is responsible for the careful and responsible management...
_________ means that employees know what is expected of them, and they...
____________ is a process that oneundertakes voluntarily to prove...
Choose the letters the fills the blanks of the following question....
A set of programs that enables a hacker to gain administrative level...
A person who attacks computers and information systems in order to...
A type of attacker that is extremely difficult to detect or stop...
An attack on an information system that takes advantage of a...
Statements about how people should behave fit together to form the...
Although end-users often get the blame when it comes to using illegal...
Reporting a trade secret is an effort by an employee to attract...
Which of the following is an activity on how companies gain goodwill...
The process of assessing security-related risks from both internal and...
Dell was at one time the largest personal manufacturer in the...
Which of the following is true about why fostering good business...
___________ makes employees more aware of the company's code of...
A device that works to prevent an attack by blocking viruses,...
Alert!

Advertisement