You are on page 1of 3

Cybersecurity 101, Final Quiz

1. Why do we need Ethics?


A. Promotes a sense of fairness
B. Creates a set of rules or acceptable behaviors
C. Ethical practices help us identify and what unacceptable behavior looks and feels like
2. Ethics can be both Written and Unwritten.

True
False

3. What are sources of Ethics?


A.
B.
C.
D.

Laws Love Hate Fear Philosophy Family


Laws Feelings Societal Norms Religion Philosophy Family
Laws Feelings Fear Values Moral Family
Believes Love Values Religion Philosophy Family

4. Ethical behavior requires both courage and humility?

True
False

5. Which one is a good Netiguette on how to behave online?


A.
B.
C.
D.

Pretend to be someone else


Post or distribute illegal material
Do not use abusive or threatening language
Try to obtain personal info about someone

6. What will you do if Cyberbullying happens to you?


A.
B.
C.
D.
E.

Do not respond to any messages, posts or emails


Block offenders
Document and report the behavior so it can be addressed
Flag the content so other people arent hurt by it
All of the Above

7. Report Cyberbullying to your parents and law enforcement, especially for the following
reasons:
A.
B.
C.
D.
E.

Threats of violence
Explicit messages or photos
Taking a photo or video of someone in a place where he or she would expect privacy
Stalking and hate crimes
All of the Above

8. Which one is NOT a 10 Commandments of Computer Ethics?


A. Thou shalt not copy or use proprietary software for which you have not paid.
B. Thou shalt not use other people's computer resources without authorization or proper
compensation.
C. Thou shalt not appropriate other people's intellectual output.
D. Thou shalt not think about the social consequences of the program you are writing or the
system you are designing.
9. In dealing with safety online, you should NEVER publically share these things online:
A.
B.
C.
D.
E.

Passwords
Social Security number
Student ID number
Other Personally Identifiable Information (PII)
All of the Above

10. When using a secure website, especially when submitting PII. Look for a RED background
or RED text.

True
False

11. You should ALWAYS use Save Password or Remember Me functions on browser tools.

True
False

12. You should post your location when using social media. This way your friends will know
where you are at all times.

True
False

13. The three goals of information security are:


A.
B.
C.
D.

Confidentiality, Honesty, and Availability


Confinement, Integrity, and Availability
Confidentiality, Integrity, and Advancement
Confidentiality, Integrity, and Availability

14. User Access Control is also a part of Availability in the CIA Triad?

True
False

15. There are three types of methods of Authentication/Encryption:

A.
B.
C.
D.

Passwords, Personal keys, and Biometrics


Passwords, Physical keys, and Biometrics
Passwords, Fake keys, and Biometrics
Passwords, House keys, and Biometrics

16. What are the two types of Cracking Threats?


A. Brown Force and Dictation
B. Brute Force and Binary
C. Brute Force and Dictionary
17. Whats the ayconom for building a strong password?
A.
B.
C.
D.

Clouds and Stars


Clouds and Moons
Clouds and Rain
Clouds and Sun

18. What are the TWO major Physical Threats on the Internet?
A.
B.
C.
D.

Cliff Diving and Wave Surfing


Board Diving and Shoulder Pressing
Dumpster Diving and Shoulder Surfing
Dumpster Digging and Shoulder Slinging

19. The central processing unit (CPU) does the grunt work of the computer.

True
False

20. Random access memory (RAM) saves your progress in many different software programs,
RAM is permanent.

True
False

You might also like