C961 ETHICS IN TECHNOLOGY GLOSSARY TERMS
EXAM STUDY MATERIALS QUESTION AND
ANSWERS (VERIFIED ANSWERS)
1. **A document that outlines restrictions and practices for using organizational computing and network
resources is known as:**
- A) Access Control Policy
- B) Privacy Policy
- C) Acceptable Use Policy (AUP)
- D) Security Policy
- **Answer: C) Acceptable Use Policy (AUP)**
2. **A network attack where an intruder remains undetected for an extended period to steal data is
called:**
- A) Denial-of-Service Attack
- B) Phishing Attack
- C) Advanced Persistent Threat (APT)
- D) Man-in-the-Middle Attack
- **Answer: C) Advanced Persistent Threat (APT)**
3. **An agreement by the World Trade Organization that requires enforcement of intellectual property
rights is:**
- A) General Agreement on Tariffs and Trade (GATT)
- B) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
- C) World Intellectual Property Organization (WIPO) Agreement
,ESTUDY
- D) Trade-Related Investment Measures (TRIMs)
- **Answer: B) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)**
4. **Laws aimed at reducing frivolous lawsuits against individuals or groups opposing corporations or
government officials are called:**
- A) Anti-SLAPP Laws
- B) Defamation Laws
- C) Tort Reform Laws
- D) Free Speech Laws
- **Answer: A) Anti-SLAPP Laws**
5. **Software that detects specific virus signatures is known as:**
- A) Firewall
- B) Intrusion Detection System (IDS)
- C) Antivirus Software
- D) Encryption Software
- **Answer: C) Antivirus Software**
6. **The combination of people, procedures, and technology to simulate human intelligence is referred
to as:**
- A) Machine Learning
- B) Artificial Intelligence Systems
- C) Neural Networks
- D) Expert Systems
- **Answer: B) Artificial Intelligence Systems**
, ESTUDY
7. **The moral corruption of people in power often due to a tendency to ignore inappropriate behavior
is known as:**
- A) Power Corruption
- B) Ethical Blindness
- C) Bathsheba Syndrome
- D) Authority Bias
- **Answer: C) Bathsheba Syndrome**
8. **A sophisticated threat that combines features of viruses, worms, and Trojan horses is called:**
- A) Hybrid Threat
- B) Blended Threat
- C) Composite Threat
- D) Complex Threat
- **Answer: B) Blended Threat**
9. **A set of skills and abilities required for licensed professionals is known as:**
- A) Certification Standards
- B) Professional Competency
- C) Body of Knowledge
- D) Skill Set Requirements
- **Answer: C) Body of Knowledge**
10. **A network of compromised computers controlled by hackers without the owners' consent is called
a:**
- A) Zombie Network
- B) Botnet