暗記メーカー
ログイン
Ethics
  • BUGAOISAN IAN DENVER P.

  • 問題数 28 • 5/20/2024

    記憶度

    完璧

    4

    覚えた

    11

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    What is a short, descriptive piece of writing that captures a specific moment or scene?

    Vignette

  • 2

    What refers to social conventions about right and wrong that are so widely shared that they become the basis for an established consensus?

    Morals

  • 3

    What is a set of beliefs about right and wrong behavior within a society.

    Ethics

  • 4

    It is one’s personal beliefs about right and wrong, while the term

    Morals

  • 5

    What is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies).

    Law

  • 6

    What is a calling that requires specialized knowledge and often long and intensive academic preparation?

    Profession

  • 7

    What is information, generally unknown to the public, that a company has taken strong measures to keep confidential?

    Trade Secret

  • 8

    What is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest?

    Whistle Blowing

  • 9

    ACM

    Association for Computing Machineries

  • 10

    IEEE-CS

    Institute of Electronics and Electrical Engineers - Computer Society

  • 11

    AITP

    Association of Information Technology Professionals

  • 12

    SANS Institute

    SysAdmin, Network, Security

  • 13

    It is a malicious code that causes unexpected computer behavior, often infecting files or sitting in memory.

    Computer Virus

  • 14

    Name of Virus that deletes all data in the recipient's mapped drives.

    WM97/Resume.A

  • 15

    Are hidden malicious programs that can destroy hard drives, corrupt files, remotely control computers, launch attacks, steal passwords, and spy on users.

    Trojan Horse

  • 16

    It is a fake antivirus tool that infiltrates users' computers using Trojan horses and logic bombs.

    WIN-7 Anti Virus 2012

  • 17

    It is the misuse of email systems to send unsolicited messages to large numbers of people,

    Email Spam

  • 18

    It involve malicious hackers taking over computers via the internet, flooding them with data and small tasks.

    DDoS Attack

  • 19

    It is a set of programs that allows an attacker to gain administrator-level access to a computer without the user's knowledge.

    Rootkit

  • 20

    It is the fraudulent use of email to trick recipients into sharing personal data.

    Phishing

  • 21

    It involves sending fraudulent emails to employees, posing as high-level executives, and directing them to a fake website.

    Spear-Phishing

  • 22

    Are the primary method for distributing phishing scams. Stratfor, an intelligence analysis firm.

    Botnets

  • 23

    It is a type of phishing scam using SMS texting to trick victims into clicking on a specific phone number or website.

    Smishing

  • 24

    It is a form of phishing where victims receive voicemails instructing them to call a phone number or access a website.

    Vishing

  • 25

    It protects trade secrets from competitors, which are often stolen by insiders like disgruntled employees

    Economic Espionage Act of 1996

  • 26

    They exploit information technology for monetary gain, stealing credit card numbers, personal identities, and cell phone IDs.

    Computer Criminals

  • 27

    It is a secure, private, and reliable computing method demanded by organizations worldwide. Microsoft

    Trustworthy Computing

  • 28

    It is a crucial prevention tool that assesses an organization's security policy and its implementation.

    Secure Audit