Cyber Security Quiz: Learn About Security, Privacy And IT Ethics

15 Questions | Total Attempts: 4859

SettingsSettingsSettings
Cyber SecurITy Quiz: Learn About SecurITy, Privacy And IT Ethics - Quiz

Check out our 'Cyber security quiz' where you will get to know and learn about information security, privacy, and IT ethics. Have you ever heard of these terminologies? If yes, take up the quiz below and assess yourself. Information technology ethics is the study of the ethical issues arising out of the use and development of electronic technologies. Test yourself if you really know about cyber security or not by playing this quiz. Best of luck, buddy!


Questions and Answers
  • 1. 
    A purchased, legal copy that is installed on more computers than the copy is licensed for is what?
    • A. 

      End-User piracy

    • B. 

      Internet piracy

    • C. 

      Captain hook

    • D. 

      Software Counterfeiting

  • 2. 
    Who does piracy hurt?
    • A. 

      Retail stores

    • B. 

      Software developers

    • C. 

      Legal software users

    • D. 

      All of the above

  • 3. 
    Software Piracy cost an estimated how much worldwide during 2007?
    • A. 

      $15 billion

    • B. 

      $20 billion

    • C. 

      $30 billion

    • D. 

      $40 billion

  • 4. 
    Approximately how much of the world's software is pirated?
    • A. 

      15%

    • B. 

      25%

    • C. 

      35%

    • D. 

      45%

  • 5. 
    Which of the following are member of the Business Software Alliance?
    • A. 

      Apple

    • B. 

      McAfee

    • C. 

      Symantec

    • D. 

      All of the above

  • 6. 
    What state has the highest fraud rate in the United States?
    • A. 

      Texas

    • B. 

      Wisconsin

    • C. 

      California

    • D. 

      Tennessee

  • 7. 
    What percentage of spyware transmits information about users browsing habits?
    • A. 

      15%

    • B. 

      25%

    • C. 

      50%

    • D. 

      60%

    • E. 

      35%

  • 8. 
    In what year was the concept of computer ethics created by Walter Maner?
    • A. 

      1986

    • B. 

      1977

    • C. 

      1976

    • D. 

      1967

  • 9. 
    Which of the following is another IT Ethics issue that was not covered?
    • A. 

      Viruses

    • B. 

      Fruad

    • C. 

      Spam

    • D. 

      Spyware

  • 10. 
    Controlling access to sensitive electronic information so only those with a legitimate need to access it are allowed to do so is known as?
    • A. 

      Piracy

    • B. 

      Ethics

    • C. 

      IT Security

    • D. 

      Security

  • 11. 
    Data cannot be changed without authorization is an example of?
    • A. 

      Confidentiality

    • B. 

      Integrity

    • C. 

      Availability

    • D. 

      Leakage

  • 12. 
    Backups, Data Encryption, Data Masking, and Data Erasure are components of?
    • A. 

      Incident management

    • B. 

      Digital forensics

    • C. 

      Data security

    • D. 

      Data Integrity

  • 13. 
    _____________  is used to ensure that an organization’s selection and application of human resources (both employee and contractor) are controlled to promote security.
    • A. 

      Personnel security

    • B. 

      Physical security

    • C. 

      Training and awareness

    • D. 

      IT security

  • 14. 
    _____________ raises employee awareness about basic information security, and to train individuals with information security roles to increase their knowledge, skills and abilities.
    • A. 

      Training and awareness

    • B. 

      Enterprise continuity

    • C. 

      Incident management

    • D. 

      Confidentiality

  • 15. 
    The largest demographic age of people being affected by fraud is?
    • A. 

      Under 20 and over 60

    • B. 

      20 - 29

    • C. 

      30 - 39

    • D. 

      40 - 49

    • E. 

      50 - 59

Back to Top Back to top