問題一覧
1
What is a short, descriptive piece of writing that captures a specific moment or scene?
Vignette
2
What refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus?
Morals
3
What is a set of beliefs about right and wrong behavior within a society.
Ethics
4
It is one’s personal beliefs about right and wrong, while the term
Morals
5
What is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies).
Law
6
What is a calling that requires specialized knowledge and often long and intensive academic preparation?
Profession
7
What is information, generally unknown to the public, that a company has taken strong measures to keep confidential?
Trade Secret
8
What is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest?
Whistle Blowing
9
ACM
Association for Computing Machineries
10
IEEE-CS
Institute of Electronics and Electrical Engineers - Computer Society
11
AITP
Association of Information Technology Professionals
12
SANS Institute
SysAdmin, Network, Security
13
It is a malicious code that causes unexpected computer behavior, often infecting files or sitting in memory.
Computer Virus
14
Name of Virus that deletes all data in the recipient's mapped drives.
WM97/Resume.A
15
Are hidden malicious programs that can destroy hard drives, corrupt files, remotely control computers, launch attacks, steal passwords, and spy on users.
Trojan Horse
16
It is a fake antivirus tool that infiltrates users' computers using Trojan horses and logic bombs.
WIN-7 Anti Virus 2012
17
It is the misuse of email systems to send unsolicited messages to large numbers of people,
Email Spam
18
It involve malicious hackers taking over computers via the internet, flooding them with data and small tasks.
DDoS Attack
19
It is a set of programs that allows an attacker to gain administrator-level access to a computer without the user's knowledge.
Rootkit
20
It is the fraudulent use of email to trick recipients into sharing personal data.
Phishing
21
It involves sending fraudulent emails to employees, posing as high-level executives, and directing them to a fake website.
Spear-Phishing
22
Are the primary method for distributing phishing scams. Stratfor, an intelligence analysis firm.
Botnets
23
It is a type of phishing scam using SMS texting to trick victims into clicking on a specific phone number or website.
Smishing
24
It is a form of phishing where victims receive voicemails instructing them to call a phone number or access a website.
Vishing
25
It protects trade secrets from competitors, which are often stolen by insiders like disgruntled employees
Economic Espionage Act of 1996
26
They exploit information technology for monetary gain, stealing credit card numbers, personal identities, and cell phone IDs.
Computer Criminals
27
It is a secure, private, and reliable computing method demanded by organizations worldwide. Microsoft
Trustworthy Computing
28
It is a crucial prevention tool that assesses an organization's security policy and its implementation.
Secure Audit