Security Ethics, Security Breach Scenarios & Corporate Security

This is a computer science engineering quiz on cybersecurity, which includes questions on security ethics, security breach scenarios, and corporate security.

download.jpg
Start Quiz

What is the ethics behind training how to hack a system?

To think like hackers and know how to defend such attacks To hack a system without the permission To hack a network that is vulnerable To corrupt software or service using malware

___________ has now evolved to be one of the most popular automated tools for unethical hacking.

Automated apps Database software Malware Worms

Leaking your company data to the outside network without prior permission of senior authority is a crime.

True False

_____________ is the technique used in business organizations and firms to protect IT assets.

Ethical hacking Unethical hacking Fixing bugs Internal data-breach

Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?

Know the nature of the organization Characteristics of work done in the firm System and network Type of broadband company used by the firm

An ethical hacker must ensure that proprietary information of the firm does not get leaked.

True False

After performing ____________ the ethical hacker should never disclose client information to other parties.

hacking cracking penetration testing exploiting

__________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.

Social ethics Ethics in cyber-security Corporate ethics Ethics in black hat hacking

___________ is an activity that takes place when cyber-criminals infiltrates any data source and takes away or alters sensitive information.

Data-hack Data-stealing Database altering Data breach

Which of these is not a step followed by cyber-criminals in data breaching?

Research and info-gathering Attack the system Fixing the bugs Exfiltration

What types of data are stolen by cyber-criminals in most of the cases?

Data that will pay once sold Data that has no value Data like username and passwords only Data that is old

Which of the companies and organizations do not become the major targets of attackers for data stealing?

Business firms Medical and Healthcare Government and secret agencies NGOs

___________ will give you an USB which will contain ___________ that will take control of your system in the background.

Attackers, Trojans White hat hackers, antivirus White hat hackers, Trojans Attackers, antivirus

Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.

A good

Not so good

Very good social engineering practice

A bad

The legal risks of ethical hacking include lawsuits due to __________ of personal data.

Stealing

Disclosure

Deleting

Hacking

Quiz/Test Summary
Title: Security Ethics, Security Breach Scenarios & Corporate Security
Questions: 15
Contributed by:
james