-
web.groovymark@gmail.com
- December 26, 2024
Question 21
A company uses deceptive marketing to lure customers into buying a product that does not meet advertised standards. What ethical issue does this practice raise?
a) Data privacy
b) Lack of transparency
c) Misrepresentation
d) Conflict of interest
Correct Answer: c) Misrepresentation
Explanation: Misrepresentation occurs when false or misleading information is provided, in this case, by advertising a product that fails to meet the claimed standards.
Question 22
Which legal framework regulates the transfer of personal data from the European Union to non-EU countries?
a) USA Freedom Act
b) Gramm-Leach-Bliley Act (GLBA)
c) General Data Protection Regulation (GDPR)
d) Foreign Intelligence Surveillance Act (FISA)
Correct Answer: c) General Data Protection Regulation (GDPR)
Explanation: GDPR regulates the transfer of personal data outside the EU, ensuring that such data is adequately protected in non-EU countries.
Question 23
Which type of cyberattack involves sending a large volume of traffic to a target system to overwhelm and disable it?
a) Phishing
b) Spear phishing
c) Distributed Denial of Service (DDoS) attack
d) Smishing
Correct Answer: c) Distributed Denial of Service (DDoS) attack
Explanation: A DDoS attack floods a target system with traffic, overwhelming its resources and causing it to become unavailable to legitimate users.
Question 24
What is the primary function of a firewall in network security?
a) To encrypt sensitive data
b) To prevent unauthorized access to a network
c) To monitor user activity on the network
d) To improve system performance
Correct Answer: b) To prevent unauthorized access to a network
Explanation: A firewall acts as a barrier between a trusted internal network and untrusted external networks, preventing unauthorized access while allowing legitimate communication.
Question 25
Which type of intellectual property protection is primarily used to distinguish a company’s products from competitors’?
a) Patent
b) Copyright
c) Trademark
d) Trade secret
Correct Answer: c) Trademark
Explanation: A trademark protects distinctive logos, names, or symbols that distinguish a company’s products from those of its competitors, helping to establish brand identity.
Question 26
Which law governs the protection of consumers’ financial data in the United States?
a) Health Insurance Portability and Accountability Act (HIPAA)
b) Family Educational Rights and Privacy Act (FERPA)
c) Gramm-Leach-Bliley Act (GLBA)
d) Children’s Internet Protection Act (CIPA)
Correct Answer: c) Gramm-Leach-Bliley Act (GLBA)
Explanation: The Gramm-Leach-Bliley Act (GLBA) regulates how financial institutions collect, share, and protect consumers’ personal financial information.
Question 27
What ethical issue arises when a company tracks a user’s online behavior without obtaining their explicit consent?
a) Intellectual property theft
b) Lack of transparency
c) Conflict of interest
d) Breach of duty
Correct Answer: b) Lack of transparency
Explanation: Tracking users' online behavior without their consent violates the principle of transparency, as users should be informed about how their data is collected and used.
Question 28
A hacker gains administrative access to a company’s network without the owner’s knowledge. What type of malware is this most likely associated with?
a) Virus
b) Rootkit
c) Worm
d) Logic bomb
Correct Answer: b) Rootkit
Explanation: A rootkit is a type of malware that allows attackers to gain administrator-level access to a system without detection, making it difficult to identify and remove.
Question 29
Which ethical framework asserts that moral judgments are subjective and depend on individual or cultural viewpoints?
a) Utilitarianism
b) Deontology
c) Virtue ethics
d) Relativism
Correct Answer: d) Relativism
Explanation: Relativism holds that moral judgments are based on individual or cultural perspectives, meaning that there is no absolute standard of right or wrong.
Question 30
Which law protects the privacy of student educational records in the United States?
a) Health Insurance Portability and Accountability Act (HIPAA)
b) Family Educational Rights and Privacy Act (FERPA)
c) General Data Protection Regulation (GDPR)
·d) USA Freedom Act
Correct Answer: b) Family Educational Rights and Privacy Act (FERPA)
Explanation: FERPA provides students and their parents with rights regarding the privacy and accuracy of educational records maintained by educational institutions.
Question 31
Which ethical challenge is associated with the widespread use of artificial intelligence (AI) in decision-making processes?
a) Increased system performance
b) Algorithmic bias
c) Data transparency
d) Lack of accountability
Correct Answer: b) Algorithmic bias
Explanation: Algorithmic bias is a significant ethical concern in AI, as it can lead to unfair or discriminatory outcomes based on biased training data or flawed algorithms.
Question 32
A company chooses not to implement security patches on its systems to avoid downtime. Which type of risk management strategy is this?
a) Mitigation
b) Transference
c) Avoidance
d) Acceptance
Correct Answer: d) Acceptance
Explanation: Risk acceptance occurs when a company decides to accept the potential risks associated with not addressing a vulnerability, often due to cost or operational concerns.
Question 33
Which form of digital communication is most vulnerable to smishing attacks?
a) Email
b) Social media posts
c) Text messages
d) Online forums
Correct Answer: c) Text messages
Explanation: Smishing is a type of phishing attack that uses text messages to deceive individuals into providing sensitive information, such as passwords or financial details.
Question 34
What is the primary function of a digital signature in secure communications?
a) To encrypt the message
b) To provide non-repudiation
c) To improve system performance
d) To manage system access
Correct Answer: b) To provide non-repudiation
Explanation: A digital signature ensures non-repudiation by verifying the identity of the sender and ensuring that the message cannot be denied after being sent.
Question 35
A software developer inflates their resume to claim expertise in areas where they lack experience. What ethical issue does this represent?
a) Conflict of interest
b) Misrepresentation
c) Data integrity
d) Intellectual property theft
Correct Answer: b) Misrepresentation
Explanation: Inflating a resume is an example of misrepresentation, as it involves providing false information to gain a position or advantage.
Question 36
Which ethical principle is violated when a company tracks user behavior online without their knowledge or consent?
a) Data availability
b) Transparency
c) Integrity
d) Accountability
Correct Answer: b) Transparency
Explanation: Tracking user behavior without their knowledge or consent violates the principle of transparency, as users should be informed about how their data is collected and used.
Question 37
A company prioritizes data integrity over other security measures. Which aspect of the CIA triad is being emphasized?
a) Availability
b) Confidentiality
c) Integrity
d) Accountability
Correct Answer: c) Integrity
Explanation: Data integrity ensures that information remains accurate and unaltered, preventing unauthorized changes to critical data during storage or transmission.
Question 38
Which law provides legal protections for trade secrets in the U.S.?
a) Fair Credit Reporting Act
b) Defend Trade Secrets Act
c) Gramm-Leach-Bliley Act
d) Communications Decency Act
Correct Answer: b) Defend Trade Secrets Act
Explanation: The Defend Trade Secrets Act provides federal protection for trade secrets in the U.S., allowing companies to pursue civil remedies for trade secret misappropriation.
Question 39
Which type of malicious code executes its payload when triggered by a specific event or time?
a) Trojan horse
b) Logic bomb
c) Worm
d) Virus
Correct Answer: b) Logic bomb
Explanation: A logic bomb is a type of malicious code that is programmed to execute when triggered by a specific event, such as a particular date or system activity.
Question 40
What is the purpose of the Children’s Internet Protection Act (CIPA)?
a) To regulate online advertising
b) To protect minors from harmful online content
c) To enforce intellectual property rights
d) To enhance data encryption
Correct Answer: b) To protect minors from harmful online content
Explanation: CIPA requires schools and libraries that receive federal funding to implement measures that protect minors from accessing harmful content on the internet.