CHAPTER-3, CYBER ETHICS

1. _______ helps to classify arguments and situations, better understand a cyber-crime and helps to determine appropriate actions.

 
 
 
 

2. ________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong.

 
 
 
 

3. Before performing any penetration test, through legal procedure, which key points listed below is not mandatory?

 
 
 
 

4. A penetration tester must identify and keep in mind the ___________ & ___________ requirements of a firm while evaluating the security postures.

 
 
 
 

5. _____________ is the technique used in business organizations and firms to protect IT assets.

 
 
 
 

6. The legal risks of ethical hacking include lawsuits due to __________ of personal data.

 
 
 
 

7. After performing ____________ the ethical hacker should never disclose client information to other parties.

 
 
 
 

8. What is the ethics behind training how to hack a system?

 
 
 
 

9. Performing a shoulder surfing in order to check other’s password is ____________ ethical practice.

 
 
 
 

10. ___________ has now evolved to be one of the most popular automated tools for unethical hacking.

 
 
 
 

Question 1 of 10