100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ETHICS IN TECHNOLOGY Ethics DSST (Review Test )ACTUAL REVIEW QUESTIONS WITH COMPLETE ANSWERS

Rating
5.0
(1)
Sold
-
Pages
33
Grade
A+
Uploaded on
16-11-2023
Written in
2024/2025

ETHICS IN TECHNOLOGY Ethics DSST (Review Test )ACTUAL REVIEW QUESTIONS WITH COMPLETE ANSWERSETHICS IN TECHNOLOGY Ethics DSST (Review Test )ACTUAL REVIEW QUESTIONS WITH COMPLETE ANSWERSETHICS IN TECHNOLOGY Ethics DSST (Review Test )ACTUAL REVIEW QUESTIONS WITH COMPLETE ANSWERSETHICS IN TECHNOLOGY Ethics DSST (Review Test )ACTUAL REVIEW QUESTIONS WITH COMPLETE ANSWERS

Show more Read less
Institution
ETHICS IN TECHNOLOGY
Module
ETHICS IN TECHNOLOGY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ETHICS IN TECHNOLOGY
Module
ETHICS IN TECHNOLOGY

Document information

Uploaded on
November 16, 2023
Number of pages
33
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ETHICS IN TECHNOLOGY Ethics DSST
(Review Test 2023-2024)ACTUAL REVIEW
QUESTIONS WITH COMPLETE
ANSWERS
1.Boot Sector Virus - ANS-An infectious program that can replace the boot program with a
modified, infected version, often causing boot and data retrieval problems.

The boot sector virus is so named because it can overtake your computer when it is
booting up.


2.Trojan Horse or Program Virus - ANS-a coded program which masks the existence of a
virus or malware by making its appearance look normal while containing malicious
utilities transparent to the user; utilities that execute unnoticed in the background until it
is too late.


Primary intent is to steal personal info


3.Macro Virus - ANS-a virus that attaches itself to a document that uses macros ie.
Microsoft Word and Excel


4.Browser Hijacker - ANS-Changes your homepage or settings in your browser window
have been modified without your permission. Come from adware and spyware.


5.Resident Virus - ANS-Loaded into random access memory (RAM) each time the
computer is turned on and stays there.


Can effect any file in your system if the program is not executed.


6.Cavity Virus - ANS-Sometimes called a spacefiller virus, is inserted into the emptyspaces
that exist in regular computer files.


Undetectable since it does not change the size of the file.

, ETHICS IN TECHNOLOGY Ethics DSST
(Review Test 2023-2024)ACTUAL REVIEW
QUESTIONS WITH COMPLETE
ANSWERS
7.Polymorphic Virus - ANS-A virus that can change its own code or periodically rewrites
itself to avoid detection. Changes its name to avoid detection.


8.Overwrite Virus - ANS-a virus that can partially or completely delete information
contained in files it infects. Even replacing portions of application code with its own
payload.


9.Multipartite Virus - ANS-Literally meaning "multipart" virus; spread in numerous ways
and infect your computer based on different variables including the start-up of an
operating system,


10.Avoiding Virus and Trojans - ANS-Always avoid opening e-mail and attachments from
individuals you do not know.

, ETHICS IN TECHNOLOGY Ethics DSST
(Review Test 2023-2024)ACTUAL REVIEW
QUESTIONS WITH COMPLETE
ANSWERS
Install reputable anti-virus software
Never activate questionable hyperlinks.
Add a firewall or router to your network.

Run your anti-virus frequently, especially after each session where you havedownloaded
apps or programs.


11.CIA of Cybersecurity - ANS-Confidentiality, Integrity and Availability


Malware - ANS-software that is intended to damage or disable computers and computer
systems. Non self replicating.


Computer Virus - ANS-a software program capable of reproducing itself and usually
capable of causing great harm to files or other programs on the same computer


Signature Based Virus Detection - ANS-Has its own detection database. Need to stay up to
date on the user side to be effective. attackers continuously change virus to avoiddetection


Confidentiality - ANS-Cybersecurity should ensure that the information to be secured is
only accessible to authorized users and prevents the disclosure of information to
unauthorized parties.


ie to implement confidentiality of company information on a cloud-based Customer
Relationship Management (CRM) system, access can be restricted to users with theright
username-password combination


Integrity - ANS-Cybersecurity efforts should ensure information remains accurate,
consistent and not subject to unauthorized modification.


ie: info not intercepted and modified by an intruder.

, ETHICS IN TECHNOLOGY Ethics DSST
(Review Test 2023-2024)ACTUAL REVIEW
QUESTIONS WITH COMPLETE
ANSWERS
Availability - ANS-Efforts to secure information in cyberspace should not hinder itsaccess
by an authorized party. Additionally, cybersecurity implementation has to provide for
redundancy access in case of any outage.


Caesar Cipher - ANS-a technique for encryption that shifts the alphabet by somenumber of
characters


Enigma Machine - ANS-German secret code machine. The Allies managed to crack thecode
and read German messages.


Non-repudiation - ANS-know who accessed this information, when, and how. example: f
someone accesses your bank balance information, the bank will know who did it and when it
was accessed and how they got it.
£17.88
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all reviews
1 year ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DrREED Chamberlain college of nursing
Follow You need to be logged in order to follow users or courses
Sold
117
Member since
3 year
Number of followers
25
Documents
2005
Last sold
10 hours ago
Perfect Top Expert scores

Welcome to my all inclusive store. Get all quality study materials at a cost-effective price thank you

4.9

744 reviews

5
721
4
11
3
5
2
2
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions