You are on page 1of 4

QUIZ 1 – COMPUTER ETHICS AND CYBER LAWS

Name: Ku Muhammad Akashah bin Ku Abdul Kadir


Matric Number: MC200410808

1) A computing system is a collection of _________________.


A) computer hardware
B) data
C) computer activities
D) people

2) The term Cyber crime refers to __________________.


A) events that damage computer hardware
B) any illegal activities involving a computer
C) Internet-based illegal acts
D) destructive events or pranks

3) Which security goal is to ensure the data could not be altered by the unauthorized user?
A) Integrity
B) Confidentiality
C) Availability
D) Legitimate use

4) Security _________ is designed to detect, prevent or recover from security attack.


A) mechanism
B) service
C) threat
D) attack

5) ____________occurred when an asset of the system becomes lost, unavailable or unusable.


A) Modification
B) Fabrication
QUIZ 1 – COMPUTER ETHICS AND CYBER LAWS

C) Interruption
D) Interception

6) Physical access controls, such as locked doors and windows usually are adequate to protect against
__________________.
A) software privacy
B) unauthorized access
C) hardware theft
D) all of the above

7) Which of the list below is NOT a good chosen password?


A) Alphanumeric.
B) Not from any obvious means.
C) Do not write or login everywhere.
D) Not from keyboard pattern.

8) One of the passwords selecting strategies is _________________.


A) more than 6 characters of password
B) not from any keyboard pattern
C) proactive password checking
D) expose the password to everybody

9) Encrypted (scrambled) data is called __________________.


A) hypertext
B) subtext
C) ciphertext
D) plaintext

10) A computer infected by a virus, worm or Trojan horse may have any of the following symptoms
EXCEPT__________________.
A) available memory is more than expected
B) system properties change
C) existing files and programs disappear
D) files become corrupted
QUIZ 1 – COMPUTER ETHICS AND CYBER LAWS

11) All the statements below are TRUE for the worm EXCEPT__________.
A) self-contained
B) replication
C) require a host program as a carrier
D) activated by creating process

12) There are FOUR (4) virus phases as listed below.


A) Doormat, Propagation, Triggering and Executive
B) Dormant, Proposal, Triggering and Execution
C) Dormant, Propagation, Tapping and Execution
D) Dormant, Propagation, Triggering and Execution

13) Polymorphic virus is a virus that __________________.


A) infects the boot sector of a disk
B) mutate with every new host to prevent signature detection
C) explicitly designed to hide from virus scanning programs
D) attaches itself to executable files as part of their code

14) Which of the requirements below is related to security requirements in a database?


A) User Authentication
B) Confidentiality
C) Protection
D) Shared access

15) What is the computer-based control to counter measure the database?


A) Security policy.
B) Authorization.
C) Backup and recovery.
D) Integrity control.

16) What is the vulnerability of a network?


QUIZ 1 – COMPUTER ETHICS AND CYBER LAWS

A) Resource sharing.
B) Distributing the workload.
C) Increased reliability.
D) Expandability.

17) The network security threat is called__________________.


A) Threat in transit
B) Active threat
C) Fabrication threat
D) Modification

18) Ethics is a __________________.


A) rue of conduct or action prescribed by a controlling authority
B) applicable to everybody
C) set of moral principals or values
D) priority determined by courts if two laws conflict

19) A ______________ gives authors and artists exclusive rights to duplicate, publish and sell their
materials.
A) copyright
B) license
C) password
D) firewall

20) The rights of employees and employers are as listed EXCEPT ________.
A) ownership of a company
B) trade secret protection
C) employment contract
D) work for hire

You might also like