Ethics MCQ 1
Ethics MCQ 1
Ethics MCQ 1
LECTURE 1:
……….. are a structure of standards and practices that influence how people lead
their lives
a) Ethics
b) Law
ANSWAR: a
Ethics are like laws that legally mandate what is right or wrong.
a) true
b) false
ANSWAR: b
Explanation : Ethics are unlike laws that legally mandate what is right or wrong.
….. illustrate society’s views about what is right and what is wrong
a) Ethics
b) Law
ANSWAR: a
ANSWAR: b
Privacy concerns, intellectual property rights and effects on the society are some
of the common issues of ……
a) Ethics
b) Law
c) Computer ethics
ANSWAR: c
It is not strictly implemented to follow these ethics, but it is basically for the
benefit of everyone that we do.
a) True
b) False
ANSWAR: a
…….. are a set of moral standards that govern the use of computers. It is society’s
views about the use of computers, both hardware and software
a) Ethics
b) Computer ethics
c) Law
ANSWAR: b
Privacy concerns, intellectual property rights and effects on the society are some
of the common issues of computer ethics.
a) True
b) False
ANSWAR: a
ANSWAR: a
ANSWAR: a
ANSWAR: e
A spyware can delete files from a hard drive while a virus can collect data from a
computer
a) true
b) false
ANSWAR: b
Explanation : A virus can delete files from a hard drive while a spyware can
collect data from a computer
ANSWAR: a
ANSWAR: b
ANSWAR: c
ANSWAR: d
ANSWAR: e
ANSWAR:e
ANSWAR: a
… is an act of copying and publishing another person’s work without proper
citation. It’s like stealing someone else’s work and releasing it as your own work.
a) Copyright
b) Plagiarism
c) Cracking
d) Software License
ANSWAR: b
…. is a way of breaking into a system by getting past the security features of the
system. It’s a way of skipping the registration and authentication steps when
installing a software.
a) Copyright
b) Plagiarism
c) Cracking
d) Software License
ANSWAR: c
ANSWAR: d
ANSWAR: d
……Some jobs have been abolished while some jobs have become simpler as
computers have taken over companies and businesses. Things can now be done
in just one click whereas before it takes multiple steps to perform a task. This
change may be considered unethical as it limits the skills of the employees.
e) Jobs
f) Environmental Impact
g) Social Impact
h) All of them
ANSWAR: a
…….Environment has been affected by computers and the internet since so much
time spent using computers increases energy usage which in turn increases the
emission of greenhouse gases.
i) Jobs
j) Environmental Impact
k) Social Impact
l) All of them
ANSWAR: j
…..Computers and the internet help people stay in touch with family and friends.
Social media has been very popular nowadays.
m)Jobs
n) Environmental Impact
o) Social Impact
p) All of them
ANSWAR: o
ANSWAR: c
ANSWAR: a
What is plagiarism in the context of intellectual property rights?
a) Properly crediting the original author of a work
b) Selling copyrighted material without permission
c) Copying and using someone else's work without citation
d) Offering free access to one's copyrighted work
ANSWAR: c
ANSWAR: b
Answer b is wrong because it eliminates some jobs and made jobs more simpler
ANSWAR: b Lecture 1 Slide 9
What is a potential ethical concern related to the use of computers for work?
a) Increased employee skills and job satisfaction
b) Negative effects on health and safety of employees
c) Improved environmental impact due to energy-efficient computers
d) Positive social impacts on communication and relationships
ANSWAR: b
Answer B is wrong because it talks about Computer Technology not Computer Gaming
ANSWAR: b (Lecture 1 Slide 11)
ANSWAR: b
ANSWAR: b
ANSWAR: b
ANSWAR: b
ANSWAR: c
ANSWAR: a
What is plagiarism?
a) Properly crediting the original author of a work
b) A legal method of using others' work without permission
c) Copying and publishing another person's work without proper citation
d) The act of creating new works inspired by others
ANSWAR: c
ANSWAR: b
What is an ethical concern related to the health and safety of employees using
computers?
a) Increased stress relief for employees
b) Potential health issues from constant computer usage
c) Enhanced job satisfaction for computer users
d) Reduced environmental impact from computer use
LECTURE 2:
ANSWAR: a Slide 2
2) They use the same skills and tactics as a hacker but with permission from the
system owner to carry out their attack against the system.
a. True
b. False
ANSWAR: a Slide 2
3) Ethical hackers work under contract for a company or client, and their
contracts specify what is off-limits and what they are expected to do.
a. True
b. False
ANSWAR: a Slide 2
4) Their role does not depend on the specific needs of a particular organization
a. True
b. False
ANSWAR: b Slide 2
5) These hackers have limited or no training and know how to use only basic
techniques or tools
a. White-hat hackers
b. Black-hat hackers
c. Script kiddies
d. Gray-hat hackers
ANSWAR: c Slide 3
6) script kiddies Even then they may not understand any or all of what they are
doing.
a. True
b. False
ANSWAR: a Slide 3
7)……….. These hackers think like the attacking party but work for the good guys
a. White-hat hackers
b. Black-hat hackers
c. Script kiddies
d. Gray-hat hackers
ANSWAR: a Slide 3
ANSWAR: a Slide 3
10)…….. These hackers straddle the line between good and bad and have decided
to reform and become the good side
a. White-hat hackers
b. Black-hat hackers
c. Script kiddies
d. Gray-hat hackers
ANSWAR: d Slide 4
11) Once the gray-hat hackers are reformed, they still might not be fully trusted.
a. True
b. False
ANSWAR: a Slide 4
12)……… These hackers are the bad guys who operate on the opposite side of the
law.
a. White-hat hackers
b. Black-hat hackers
c. Script kiddies
d. Gray-hat hackers
ANSWAR: b Slide 4
ANSWAR: a Slide 4
14) In most cases, black-hat hacking and outright criminal activity are far
removed from each other.
a. True
b. False
ANSWAR: b Slide 4
16) They are not stealthy, because they are not worried about getting caught or
doing prison time.
a. White-hat hackers
b. Black-hat hackers
c. Suicide hackers
d. Gray-hat hackers
ANSWAR: c Slide 4
ANSWAR: e Slide 5
ANSWAR: f Slide 5, 6
ANSWAR: b Slide 7
ANSWAR: d Slide 7
ANSWAR: c Slide 7
ANSWAR: c Slide 7
23) This describes a threat or vulnerability that is unknown to developers and has
not been addressed.
a. target
b. zero day
c. exploit
d. target of evaluation(TOE)
ANSWAR: b Slide 7
ANSWAR: b Slide 7
ANSWAR: b Slide 7
ANSWAR: a Slide 8
27) ………. is a weakness in a system that can be attacked and used as an entry
point into an environment.
a. threat
b. vulnerability
c. Exploit
d. Daisy chaining
ANSWAR: b Slide 8
28)……… is the act of performing several hacking attacks in sequence with each
building on or acting on the results of the previous action.
a. threat
b. vulnerability
c. Exploit
d. Daisy chaining
ANSWAR: d Slide 8
29)……… means that you are using primarily passive methods of gaining
information from a target prior to performing the later active methods.
a. scanning
b. footprinting
c. enumeration
d.system hacking
ANSWAR: b Slide 9
30) ……is the phase in which you take the information gleaned from the
footprinting phase
a. scanning
b. footprinting
c. enumeration
d.system hacking
ANSWAR: a Slide 9
31) The idea in…….. is to act on the information from the prior phase, not to
blunder around without purpose and set off alarms
a. scanning
b. footprinting
c. enumeration
d.system hacking
ANSWAR: a Slide 9
32) is the next phase where you extract much more detailed information about
what you uncovered in the scanning phase to determine its usefulness
a. scanning
b. footprinting
c. enumeration
d.system hacking
ANSWAR: c Slide 9
33) in enumeration Results of this step can include a list of usernames, groups,
applications, banner settings, and auditing information.
a. true
b. false
Slide 9
ANSWAR: a
34) in ……….. You can now plan and execute an attack based on the information
you uncovered.
a. scanning
b. footprinting
c. enumeration
d.system hacking
ANSWAR: d Slide 9
35) in ………. You could, for example, start choosing user accounts to attack based
on the ones uncovered in the enumeration phase
a. scanning
b. footprinting
c. enumeration
d.system hacking
ANSWAR: d Slide 9
36) in system hacking You could also start crafting an attack based on service
information uncovered by retrieving banners from applications or services.
a. true
b. false
ANSWAR: a Slide 9
37)……….. is the hacking phase, where you can start to obtain privileges that are
granted to higher privileged accounts than you broke into originally. Depending
on your skills
a. escalation of privilege
b. covering tracks
c. planting of backdoors
d. non of them
ANSWAR: a Slide 10
ANSWAR: a Slide 10
39)…….. is the phase when you attempt to remove evidence of your presence in a
system
a. escalation of privilege
b. covering tracks
c. planting of backdoors
d. non of them
ANSWAR: b Slide 10
40) in ……… You purge log files and destroy other evidence that might give away
the valuable clues needed for the system owner to determine an attack occurred.
a. escalation of privilege
b. covering tracks
c. planting of backdoors
d. non of them
ANSWAR: b Slide 10
41) means to leave something behind that would enable you to come back later
if you wanted. Items such as special accounts or Trojan horses
come to mind.
a. escalation of privilege
b. covering tracks
c. planting of backdoors
d. non of them
ANSWAR: c Slide 10
ANSWAR: f Slide 3, 4
ANSWAR: e Slide 9
ANSWAR: d Slide 10
ANSWAR: a Slide 12
ANSWAR: a Slide 12
ANSWAR: b Slide 14
4) During scanning phase tools such as these are used: Pings, Ping sweeps , Port
scans or Tracert
a. True
b. False
ANSWAR: a Slide 14
5) (Trace Route), a command-line utility that you can use to trace the path that
an Internet Protocol (IP) packet takes to its destination.
a. True
b. False
ANSWAR: a Slide 14
6) It is the initial transition from being on the outside looking in to moving to the
inside of the system to gather data. This information is carried forward into the
attack phase.
a. footprinting
b.scanning
c. enumeration
d. non of them
ANSWAR: c Slide 15
7)…………. is the systematic investigating a target with the goal of obtaining user
lists, routing tables, and protocols from the system.
a. footprinting
b. scanning
c. enumeration
d. non of them
ANSWAR: c Slide 15
ANSWAR: a Slide 16
ANSWAR: d Slide 25
11) Foca is able to find documents by extensions: it is a tool used mainly to find
metadata and hidden information in the documents its scans. These documents
may be on web pages and can be downloaded and analyzed with FOCA.
a. True
b. false
ANSWAR: a Slide 26
ANSWAR: a Slide 26
13) Displays the version of a web page that Google contains in its cache instead
of displaying the current version. Syntax: cache:<website name>
a. info
b. link
c. site
d. cache
e. allintitle
f. All of them
ANSWAR: d Slide 27
14) Lists any web pages that contain links to the page or site specified in the
query. Syntax: link:<website name>
a. info
b. link
c. site
d. cache
e. allintitle
f. All of them
ANSWAR: b Slide 27
15) resents information about the listed page. Syntax: info:<website name>
a. info
b. link
c. site
d. cache
e. allintitle
f. All of them
ANSWAR: a Slide 27
ANSWAR: c Slide 27
ANSWAR: e Slide 27
18)Returns only results with the specific query in the URL. Syntax: allinurl:
<keywords>
a. info
b. link
c. site
d. cache
e. allintitle
f. allinurl
ANSWAR: f Slide 27
ANSWAR: a Slide 28
ANSWAR: a Slide 28
ANSWAR: a Slide 2
2) the underlying goal of cryptography has never changed, even though the tools
have.
a. True
b. False
ANSWAR: a Slide 2
ANSWAR: b Slide 2
ANSWAR: a Slide 5
ANSWAR: b Slide 5
6) In today’s world, not only must information be kept secret, but provisions to
detect unwelcome or unwanted modifications are just as important.
a. True
b. False
ANSWAR: a Slide 5
ANSWAR: d Slide 5
ANSWAR: c Slide 6
9) …….is done to keep secret information from disclosure, away from prying
eyes.
a. Decryption
b.Encryption
c. Nonrepudiation
d. cryptography
ANSWAR: b Slide 6
10) Cryptography can detect changes in information and thus prove its integrity
or original unmodified state.
a. True
b. False
ANSWAR: a Slide 6
11) Cryptography can detect changes in information and thus prove its integrity
or original unmodified state. The previous part is the definition of:
a. Authentication
b.Confidentiality
c. Integrity
d. Nonrepudiation
ANSWAR: c Slide 6
ANSWAR: a Slide 6
ANSWAR: a Slide 6
ANSWAR: a Slide 6
15) …….The ability to provide positive identification of the source or originator of
an event is an important part of security
a. Authentication
b.Integrity
c. Confidentiality
d. nonrepudiation
ANSWAR: d Slide 6
ANSWAR: a Slide 6
ANSWAR: d Slide 6
ANSWAR: b Slide 6
19) ……is the original message. It has not been altered; it is the usable
information.
a. Cipher text
b. Plain text
c. Key
d. algorithms
ANSWAR: b Slide 7
ANSWAR: b Slide 7
ANSWAR: a Slide 7
22) ………it is a message or other data that has been transformed into a different
format using a mechanism known as an algorithm
a. Cipher text
b. Plain text
c. Key
d. algorithms
ANSWAR: a Slide 7
23) …….It is also something that can be reversed using an algorithm and a key
a. Cipher text
b. Plain text
c. Key
d. algorithms
ANSWAR: a Slide 7
25) ……..a formula that includes discrete steps that describe how the encryption
and decryption process is to be performed in a given instance.
a. Cipher text
b. Plain text
c. Key
d. algorithms
ANSWAR: d Slide 7
ANSWAR: c Slide 7
27) Keys: It can be thought of in the same way a key in the physical world is, as a
special item used to open or unlock something—in this case, a piece of
information?
a. Cipher text
b. Plain text
c. Keys
d. algorithms
ANSWAR: c Slide 7
ANSWAR: a Slide 8
29) in …….The Same key is used for both encryption and decryption and must be
kept secret
a. Symmetric Cryptography
b. Asymmetric Cryptography
c. Symmetric Cryptography and Asymmetric Cryptography
d. Non of them
ANSWAR: a Slide 9
ANSWAR: e Slide 10
31) The concept of public key cryptography was intended to overcome the key
management problems inherent in previous systems.
a. True
b. False
ANSWAR: a Slide 12
32) In asymmetric cryptography system, each user who is enrolled receives key
called
a. Public key only
b. Private key only
c. Public key and private key
d. Non of the above
ANSWAR: c Slide 12
33) the public key and the private key. Each person’s private key is published,
whereas the public key is kept secret.
a. True
b. False
ANSWAR: b Slide 12
34) in…….. system of generating keys provides a means of nonrepudiation that is
not possible with symmetric Systems.
a. Symmetric Cryptography/ Asymmetric Cryptography
b. Authentication system
c. Asymmetric Cryptography
d. Non of them
ANSWAR: c Slide 12
35) Since anything encrypted with the public key can be reversed only with the
corresponding private key
a. True
b. False
36) Since anything encrypted with the private key can be reversed only with the
corresponding public key
a. True
b. False
37) Since anything encrypted with the private key can be reversed only with the
corresponding public key and only one person holds the private key, then the
identity of the encrypting party can be assured. The previous part is the
definition of:
a. Cryptography
b. Digital signature
c. Symmetric cryptography
d. Non of the above
ANSWAR: b Slide 13
ANSWAR: d Slide 14
39) The process outputs what is known as a hash, hash value, or message digest
a. True
b. False
ANSWAR: a Slide 14
ANSWAR: a Slide 14
ANSWAR: d Slide 14
42) A hash function generates a ………… that is always the same length no matter
how large or small the data entering the process or algorithm is.
a. a variable-length
b. a fixed-length
c. a changeable-length
d. non of them
ANSWAR: b Slide 14
43) The fixed-length value is unique for every different input that enters the
process
a. True
b. False
ANSWAR: a Slide 14
ANSWAR: a Slide 15
ANSWAR: d Slide 15
LECTURE 5:
ANSWAR: c Slide 2
Categories of malware.…
a) viruses, worms, Trojans
b) Logic bombs
c) adware and spyware
d) all of them
ANSWAR: d Slide 3
…… are a modern form of malware that can hide within the core components of
a system and stay undetected by modern scanners.
a) Viruses
b) Logic bombs
c) Rootkits
d) None
ANSWAR: c Slide 3
ANSWAR: c Slide 3
…are by far the best-known form of malicious software. This type of malware is
designed to replicate and attach itself to other files resident on the system.
a) Viruses
b) Logic bombs
c) Rootkits
d) Adware
ANSWAR: a Slide 4
viruses require some sort of user action to initiate their infectious activities.
a) True
b) False
ANSWAR: a Slide 4
ANSWAR: d Slide 5
The author may choose to create the virus completely from scratch or use one of
the many construction kits that are available to create the virus of their choice.
a) True
b) False
ANSWAR: a Slide 6
ANSWAR: d Slide 10
One of the main characteristics of worms is their inherent ability to replicate and
spread across networks extremely quickly.
a) True
b) False
ANSWAR: a Slide 10
….. is a well-known type of malware. Many systems are actively infected with
this type of malware from the various installations and other activities they
perform.
a) Viruses
b) Adware
c) Trojan
d) Worms
e) Spyware
ANSWAR: b Slide 14
ANSWAR: e Slide 15
…….a special type of malware that infects a system and causing harm while
appearing to look like a legitimate program
a) Viruses
b) Adware
c) Spyware
d) Trojan
ANSWAR: d Slide 15
ANSWAR: d Slide 17
……To fit into this category, a Trojan must capture some sort of data from the
victim’s system, including files and keystrokes. Once captured, this data can be
transmitted via email or other means if the Trojan is so enabled. Keyloggers are
common Trojans of this type.
a) Remote Access Trojans (RATs)
b) Data Sending
c) Destructive
d) None
ANSWAR: b Slide 17
ANSWAR: c Slide 17
…..Designed to give an attacker remote control over avictim’s system. Two well-
known members of this class are the SubSeven program and its cousin, Back
Orifice, although both are older examples.
a) Remote Access Trojans (RATs)
b) Data Sending
c) Destructive
d) None
ANSWAR: a Slide 17
Spyware It may replace home pages in browsers, place pop-up ads on a user’s
desktop, or install items on a victim’s system that are designed to advertise
products or services.
a) True
b) False
ANSWAR: b Slide 14
Explanation : Adware
ANSWAR: d Slide 12
….is a commonly used mechanism to deliver messages and software because of
its widespread use and the ability to entice new users to download software.
a) Instant Messaging (IM)
b) Internet Relay Chat (IRC)
c) Email Attachments
d) None
ANSWAR: b Slide 12
….. With the rise of email as a communication medium, the practice of using it to
distribute malware has also risen.
a) Instant Messaging (IM)
b) Internet Relay Chat (IRC)
c) Email Attachments
d) None
ANSWAR: c Slide 12
….Delivering malicious software via IM is easy. Plus, IM software has never had
much in the way of security controls.
a) Instant Messaging (IM)
b) Internet Relay Chat (IRC)
c) Email Attachments
d) None
ANSWAR: a Slide 12
….Downloading software for free from unknown or untrusted sources can mean
that you also download something nastier, such as spyware.
a) Physical Access
b) Browser Defects
c) Freeware
d) Websites
ANSWAR: c Slide 13
ANSWAR: d Slide 13
ANSWAR: b Slide 13
ANSWAR: a Slide 13
ANSWAR: c Slide 2
ANSWAR: b Slide 3
ANSWAR: b Slide 4
Slide 4 (Viruses spread by infecting files or software that are then transferred from one system to
another. This can happen through a variety of means, including email attachments, file downloads,
ANSWAR: a and network file sharing)
ANSWAR: b Slide 7
Which utility can be used to convert a batch file into an executable virus?
a. Notepad
b. Antivirus software
c. JPS Virus Maker
d. bat2com
ANSWAR: d Slide 8
ANSWAR: b Slide 3
ANSWAR: c Slide 11
ANSWAR: b Slide 3
ANSWAR: c
ANSWAR: c Slide 14
ANSWAR: b Slide 7
ANSWAR: a Slide 13
What is the recommended action if you suspect your computer is infected with
malware?
a. Disconnect from the internet and perform a full system scan.
b. Share your suspicions with friends and colleagues.
c. Ignore the symptoms and continue using the computer normally.
d. Install more malware to counteract the existing malware.
What is phishing and how can it be recognized? (Not mentioned in the Slides)
ANSWAR: b
What is two-factor authentication (2FA) and why is it important? (Not mentioned in the
Slides)
a. A method of using two different antivirus programs for enhanced protection.
b. A technique of encrypting data with two different algorithms simultaneously.
c. A security measure that requires users to provide two forms of authentication
to access an account.
d. A process of scanning a computer with two different antivirus engines.
ANSWAR: c
(Not mentioned in the Slides)
What is a DDoS attack and how does it work?
a. A virus that spreads rapidly across multiple computers in a network.
b. A method of encrypting data to render it unreadable without a decryption key.
c. A cyber attack that floods a network or website with a massive volume of
traffic to disrupt its services.
d. A technique of infiltrating a system by exploiting vulnerabilities in its firewall.
ANSWAR: c
What is ransomware and how does it typically infect a system? (Not mentioned in the slides)
a. A type of malware that locks computer files and demands a ransom for their
release.
b. A technique of exploiting vulnerabilities in network routers to gain
unauthorized access.
c. A form of attack that manipulates search engine results to redirect users to
malicious websites.
d. A method of encrypting email messages to protect them from unauthorized
access.
ANSWAR: a
What is a firewall and what is its role in cybersecurity? (Not mentioned in the slides)
ANSWAR: a
What is the purpose of a virtual private network (VPN)? (Not mentioned in the Lectures)
a. To protect computer hardware from physical damage.
b. To create a secure and encrypted connection over a public network.
c. To scan and remove malware from a computer system.
d. To optimize network performance and improve internet speed.
ANSWAR: b
ANSWAR: a Lecture 5 Slide 4, 10 (last answer is not correct because host applications is mentioned only in
worms)
What is the primary characteristic of spyware?
a) It asks for the user's permission before collecting information.
b) It operates behind the scenes to collect information without user consent.
c) It only targets ads and generates revenue.
d) It alters system settings openly.
Which method of spyware infection involves users downloading software for free
from untrusted sources?
a) Physical Access
b) Freeware Download
c) Browser Defects
d) Email Attachments
What is the primary motive for spyware authors to collect information from
victims' systems?
a) To enhance system security
b) For research and analysis purposes
c) To generate revenue or steal sensitive information
d) To provide a better user experience
Which of the following is a legitimate way to protect your system from spyware?
a) Never update your software or browsers
b) Download software from untrusted sources
c) Regularly update your software and use reputable security software
d) Disable your firewall and antivirus programs
Which type of Trojan is designed to provide an attacker with remote control over
a victim's system?
a) Data Sending Trojan
b) Destructive Trojan
c) Adware Trojan
d) Remote Access Trojan (RAT)