ITE302c - NHS

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/592

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

593 Terms

1
New cards

In his speech, Mikko Hypponen pointed out how many types of online attackers?
A. 2 types
B. 4 types
C. 3 types
D. 5 types

C

2
New cards

Freedom of Expression is not recognized as a fundamental human right in human rights declaration of 1948 by The United Nations.
A. True
B. False

B

3
New cards

Sedition is a representation of freedom of expression and it is legal.
A. True
B. False

B

4
New cards

Barry Schwartz convinced that the more choices people have, the more freedom they have, and the more freedom they have, the more welfare they have.
A. True
B. False

A

5
New cards

In the online attackers' portrait by Mikko, almost of online attackers are poor.
A. False
B. True

A

6
New cards

The freedom of expression is guaranteed in dictatorships and totalitarian regimes.
A. True
B. False

B

7
New cards

Hacktivists likes Anonymous group doing the hacking activities for laughs.
A. True
B. False

B

8
New cards

Whistle blowing draws attention toward the act which poses threat to common interests such as …..


A. Neglecting, violating laws
B. Neglecting, violating moral values
C. Abusing or doing harm from employers
D. Abusing or doing harm from the whistle blower

A. A, B and C
B. B, D and A
C. B, C and D
D. A, C and D

A

9
New cards

Which is the top secret information that Snowden leaked out?


A. The global surveillance programs leading by China and Russia governments.
B. The global safety programs leading by US and Ukraine governments.
C. The local surveillance programs leading by the cooperation of US and China governments.
D. The global surveillance programs leading by US and UK governments

D

10
New cards

A gift may be considered a bribe if the gift is not made public.
A. True
B. False

A

11
New cards

'Humaneness' is a political principle which is the main concept of operating a nation, connecting the world, reflecting the ideology of the democracy.
A. False
B. True

A

12
New cards

What is PRISM?
A. Code name of Microsoft's window products
B. Code name of a surveillance program by NSA
C. Code name of a super clever program
D. Code name of Program Request Investigation for Security Management

B

13
New cards

In his self-example, Barry Schwartz wanted to buy a new jean that is ………


A. a slim fit
B. an easy fit
C. None of the others
D. a button fly
E. a zipper fly
F. a relaxed fit

C

14
New cards

In 1981, Elk Cloner was created by a fifteen-year old high school student, Richard Skrenta, holding responsible for the first large-scale computer virus outbreak in history. Which is the targeted system of Elk Cloner?
A. SCADA system
B. IBM PC
C. TENEX PC
D. BSD Unix
E. Apple II

E

15
New cards

Which is implied by Dr. Sandel in two different cases?
A. Utilitarian is not the only approach people follow
B. Killing 1 person is worse than killing 5
C. There is only one way to make a decision by relying on utility
D. Killing 1 person for saving five people is a good choice

A

16
New cards

Technique used in manufacturing a product is categorized into a ….
A. Patent
B. Trademark
C. Copyright
D. Trade secret

D

17
New cards

Consequentialist…………………………………….
A. locates morality in the results from the act
B. locates morality in certain duties and rights
C. locates morality in the person who do the act
D. locates morality in the quality of the act

A

18
New cards

To become a junzi-a man or "superior man" - a gentleman or a sage. in Confucianism, kindness. sobriety, righteousness, wisdom and trustworthiness are given to human-being with one-self to self-improve.
A. False
B. True

B

19
New cards

In justice approach. An ethical action is______
A. certain general conditions that are…equally to everyone's advantage
B. certain ideals toward which we should strive
C. A fair action
D. an action respects the moral rights of everyone
E. that provide the greatest balance of good over evil

C

20
New cards

Which of the following is NOT one of common issues that can create friction between employers and IT workers?


A. Bribery
B. Providing False Information
C. Whistle-blowing
D. Provide too many options in the Job Interview
E. Fraud
F. Breach of Contract

D

21
New cards

In the case of cannibal in Vietnam, the man who was arrested and punished in Lang Son is ___
A. A weak man
B. A mental illness man
C. A clever man
D. A strong man

B

22
New cards

What will give you the right to exclude others from making your product?
A. Trade secret
B. Trademark
C. Copyright
D. Patent

D

23
New cards

By introducing the four stories of Trolley car case and doctor case, Dr Sandel separated four ways to evaluate ethical aspects of an action.
A. True
B. False

B

24
New cards

In his hackers' profiles, Misha Glenny found most of the hackers do not have which of the following?
A. Demonstration of any real social skills in the outside world
B. All of the others
C. Demonstration of Advanced ability in maths and sciences

A

25
New cards

In rights approach, an ethical action is _________
A. an action respects the moral rights of everyone
B. certain ideals toward which we should strive
C. that provide the greatest balance of good over evil
D. A fair action
E. certain general conditions that are…equally to everyone's advantage

A

26
New cards

In his speech, Mikko concluded these facts:

  1. Criminals attack for an opinion

  2. Hacktivists attack for protests

  3. Nation states attack for protecting us

    Which are wrong?
    A. 1
    B. 2
    C. 2 and 3
    D. 3
    E. 1 and 2
    F. 1 and 3

F

27
New cards

Julian Assange, the founder of wikileaks. said that he and his organization didn't related to Snowden.
A. True
B. False

B

28
New cards

In Misha Glenny speech. a website which became a sort of supermarket for cybercriminals is ___
A. Cards of Planet
B. CarderPlanet
C. PlanetCarder
D. Planet of Cards

B

29
New cards

In Misha Glenny speech titled "Hire the hackers", he stated the facts that every companies in the world have been hacked even the cybersecurity services providers.
A. False
B. True

B

30
New cards

In Glenn Greenwald's speech, United States and its partners has converted ________ once heralded as ______of liberation and democratization.
A. The internet. best known tool
B. The intranet, best known tool
C. The internet, unprecedented tool
D. The intranet, unprecedented tool

C

31
New cards

In utilitarian approach, an ethical action is ______
A. an action respects the moral rights of everyone
B. certain ideals toward which we should strive
C. A fair action
D. that provide the greatest balance of good over evil
E. certain general conditions that are…equally to everyone's advantage

D

32
New cards

What is the exclusive right to print, publish, record, etc. of an author on his original works?
A. Trademark
B. Trade secret
C. Copyright
D. Patent

C

33
New cards

What is the first step to approach with ethical issues and also the most important task is ________
A. Learning the reasons
B. Learning by examples
C. Learning the facts
D. Learning the conventions

C

34
New cards

The concept of Humaneness in Confucianism expressed by relationships of ___
A. Human-being with other human beings in society
B. Human-being with one-self
C. Both of the others

C

35
New cards

In his speech. Glenn gave a shamed example of Eric Schmith behaviors that he ordered his employees at Google to cease speaking with the online Internet magazine Dot NET.
A. False
B. True

B

36
New cards

In his self-example, Barry Schwartz spent an hour trying on all jeans available, and he had a better choice than before with the best-fitting jeans and he felt better.
A. False
B. True

A

37
New cards

A symbol. word or words representing a company is considered as a __
A. Copyright
B. Trade secret
C. Patent
D. Trademark

D

38
New cards

In Misha Glenny speech. a little research unit in Turin, Italy performed a research called "Hackers Profiling Project" investigating about ____ of the hackers
A. The characteristics, the abilities and the socialization
B. The phenomenon, the characteristics and the socialization
C. The phenomenon, the abilities and the socialization
D. The characteristics, the abilities and the phenomenon

A

39
New cards

What is the way STUXNET virus worked?

  1. Search

  2. Update

  3. Compromise

  4. Infection

  5. Deceive and Destroy

  6. Control

A. 4->5->6->2->3->1
B. 1->2->3->4->5->6
C. 6->2->3->4->5->1
D. 4->1->2->3->6->5
E. 2->3->4->5->6->1
F. 2->4->5->1->3->6

D

40
New cards

Who is a whistle-blower?
A. A person likes to work with media and gives false information about his organization
B. A person wants to increase the market shares of his organization by giving false information
C. A person normally holds information based on his expertise or position in the business committing violation

C

41
New cards

In PMI's Code of Ethics, Fairness is ……….
A. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
B. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
C. our duty to understand the truth and act in a truthful manner both in our communication
D. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.

A

42
New cards

In PMI's Code of Ethics, Responsibility is …..
A. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
B. our duty to understand the truth and act in a truthful manner both in our communication
C. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.
D. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.

D

43
New cards

Anonymous is an international hacktivist group and they have a leader in US
A. False
B. True

A

44
New cards

Online attackers are motivated only by making money.
A. False
B. True

A

45
New cards

In his speech, Glenn indicates that a conflict in Mark Zuckerberg's behaviors while he said .. and his wife did what of the following activity?
A. Buy a new privacy license from the government
B. Buy a new house and 4 others around his home to protect his privacy
C. Sell a new house with fully security surveillance
D. Sell a privacy license for anyone using facebook
E. Buy a new car with 4 others from different manufacturer

B

46
New cards

What are the similarities between the trolley car case and the case of the Doctor mentioned in Professor Sandel's speech?
A. Saving five people without killing one person
B. Killing one person to save five people
C. Saving one person without killing five people
D. Killing five people to save one person

B

47
New cards

What is the process a conscientious worker should follow if he considers to become a whistle-blower

  1. Direct his leaders' attention to the issue

  2. If efforts to correct the problem through internal channels are hampered or ignored? Apparently, such actions will lead to negative consequences such as retaliation or dismissal.

  3. Reporting the matter to outsiders, including federal or state legal agencies

  4. Seek to solve the problem by using reasonable resource in the company
    A. 1 -> 2 -> 3 -> 4
    B. 2 -> 3 -> 4 -> 1
    C. 1 -> 4 -> 2 -> 3
    D. 2 -> 1 -> 4 -> 3
    E. 1 -> 4 -> 3 -> 2
    F. 1 -> 3 -> 2 -> 4

C

48
New cards

The purpose of the Code of Ethics and Professional Conduct by PMI is …


A. To shape by collective conduct of individual practitioners.
B. To instill confidence in the project management profession and to help an individual become a better practitioner
C. To advance our profession, both individually and collectively, by embracing the Code of Ethics and Professional Conduct
D. To assist in making wise decisions, particularly when faced with difficult situation where we may be asked to compromise our integrity or our values.

B

49
New cards

Professor Sandel warned about the …
A. Communism
B. Capitalism
C. Socialism
D. Skepticism

D

50
New cards

Glenn convinced us to support for the mindset of "Bad people have things to hide, Good people have nothing to hide"
A.True
B. False

B

51
New cards

BSA is made up of ….
A. Many lawyers
B. Many software developers
C. Many software companies
D. Many police men

C

52
New cards

According to Barry Schwartz, the negative effects of all choices on people include:

A. It produces paralysis rather than liberation
B.Even if we manage to overcome the paralysis and make a choice, we end up less satisfied with the result of the choice than we would be if we had fewer options to choose from.
C. It produces less analysis time than less choices in making decision
D. Even if we can manage the analysis time and make a choice carefully, we ….

A. D and B
B. C and D
C. A and B
D. A and D
E. B and C

C

53
New cards

What is a false information providing?
A. The act of giving inaccurate or incomplete information about a fact.
B. The act of illegally spread business information of the company that they once worked for
C. The act of a party when it fails to comply with the terms and conditions of the contract
D. The act of lying in your personal profile and faking a required IT skill
E. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
F. The act of appropriating commodities, services or property by deceiving or perform

A

54
New cards

In his speech, Steve Vondran indicated these companies as example of BSA member…
A. IBM
B. Adobe
C. Apple
D. Facebook
E. Autodesk
F. Microsoft

(không thấy hết câu hỏi nên khả năng cao là hỏi công ty nào phải BSA member, vì chỉ được chọn 1 đáp án)

D

55
New cards

The Information Security concept in FPT Software's Information Security Regulation is ..
A. Information Security is what keeps valuable information "free of danger"
B. Information Security determines the Confidentially, Integrity and Availability of Information
C. Information Security secures only the IT infrastructure
D. All of them

A

56
New cards

According to Confucian conception, ethical norms and codes are ….

  1. The three fundamental bonds the five constant virtues
  2. The loyalty
  3. The three obedience and the four virtues
  4. The betrayal
    A. 1, 2 and 3
    B. All of the others
    C. Only 3
    D. 2 and 3
    E. 1 and 2
    F. Only 1

A

57
New cards

Does freedom of speech give the right to offend?
A. No, it isn't
B. Yes, it is

A

58
New cards

What is a breach of contract?
A. The act of giving inaccurate or incomplete information about fact
B. The act of appropriating commodities, services or property by deceiving or perform
C. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
D. The act of a party when it fails to comply with the terms and conditions of the contract
E. The act of illegally spread business information of the company that they once worked for
F. The act of lying in your personal profile and faking a required IT skill

D

59
New cards

Categoricalist …
A. locates morality in the location of the act
B. locates morality in certain duties and rights
C. locates morality in the results of the act
D. locates morality in the person who do the act

B

60
New cards

What of the following is in SANS IT CODE OF ETHICS?


A. All of them
B. I treasure and will defend equality, justice and respect of others.
C. I respect intellectual property and will be careful to give credit for other's work. I will never steal or misuse copyrighted, patented material, trade secrets or any other intangible asset.
D. I will not injure others, their property, reputation, or employment by false or malicious
E. I will not steal property, time or resources
F. I will obtain permission before probing systems on a network for vulnerabilities

A

61
New cards

What information has been stolen and published by hackers in Cyber attack on Vietnam airlines
A. A list of 200.000 regular clients
B. A list of 400.000 regular clients
C. A list of 200.000 VIP clients
D. A list of 600.000 VIP clients

B

62
New cards

Which of the following is the motivation of online attackers:

  1. By money
  2. By the laughs
  3. By an opinion
  4. By protest
  5. By no reason
    A. 3, 4, 1, 5
    B. 1, 2, 3, 4
    C. 2, 3, 4, 5
    D. 2, 3, 5, 1
    E. 1, 2, 3, 5

B

63
New cards

In Cat Tuong Salon case, In Dr. Tuong violated medical ethics?
A. It is clear that he didn't violated the ninth article of medical ethical regulation in 20…
B. It is still a question but he violated the regulations on medical examination and tre … drugs or other medical services
C. He violated the ethics but he didn't violated the regulations on medical works
D. It is clear that he violated the seven vows of Hypocrate

B

64
New cards

In Chapter 2 of the Code of Ethics for Information Security there are 4 articles regarding ..:
A. Society and Community, Working Attitude, Service Quality and Information Security
B. Society and Community, Writing Attitude, Service Quality and Information Security
C. Society and Community, Working Attitude, Service Quality and Identity System
D. Supplier Responsibility, Working Attitude, Service Quality and Information Security
E. Society and Community, Writing Attitude, Supplier Responsibility and Information Security

A

65
New cards

In PMI's Code of Ethics, Honesty is ….
A. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
B. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
C. our duty to understand the truth and act in a truthful manner both in our communication
D. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.

C

66
New cards

What is WRONG information about Nguyen Phi Hung - the "pioneer" hacker of Vietnamese hacker team joining in cyber-crime competition on world stage?


A. He used the hidden software recording keystrokes to know personal information
B. He was sentenced to 80 months in prison
C. He steal $638 from his fellows' bank accounts by using their personal information
D. He committed crime by an online game with a built-in Trojan program

B

67
New cards

What is an inflating CV?
A. The act of a party when it fails to comply with the terms and conditions of the contract
B. The act of appropriating commodities, services or property by deceiving or perform
C. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
D. The act of giving inaccurate or incomplete information about a fact.
E. The act of lying in your personal profile and faking a required IT skill
F. The act of illegally spread business information of the company that they once worked for

E

68
New cards

What is a fraud?


A. The act of a party when it fails to comply with the terms and conditions of the contract
B. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
C. The act of giving inaccurate or incomplete information about a fact.
D. The act of lying in your personal profile and faking a required IT skill
E. The act of appropriating commodities, services or property by deceiving or perform
F. The act of illegally spread business information of the company that they once worked for

E

69
New cards

What of the following is NOT an Article in SANS IT CODE OF ETHICS?
A. I will not hesitate to seek assistance or guidance when faced with a task beyond my abilities or experience
B. I will advance private interests at the expense of end users, colleagues, or my employer
C. I will not steal property, time or resources.
D. I will strive to know myself and be honest about my capability

B

70
New cards

The Code of Ethics for Information Security in Viet Name is originated by which organization?
A. VINASA
B. VNISA
C. VINFAST
D. VINATABA

B

71
New cards

In PMI's Code of Ethics, Respect is ….
A. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
B. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.
C. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
D. our duty to understand the truth and act in a truthful manner both in our communication

B

72
New cards

In common-good approach, an ethical action is________
A. that provide the greatest balance of good over evil
B. A fair action
C. certain general conditions that are … equally to everyone's advantage.
D. certain ideals toward which we should strive
E. an action respects the moral rights of everyone

C

73
New cards

What is Business Software Alliance (BSA)?
A. BSA is a trade group
B. BSA is a law enforcement
C. BSA is the software cops per se
D. BSA is a police group

A

74
New cards

Imagine that your are a software developer in software company where your boss have … Defense to develop a new kind of weapons with AI technologies, and he asked you to join. If follows virtue approach, what is the best choice?


A. I will reject to join the project because it will harm people
B. I will evaluate the balancing of the benefits and the costs of the project for the public, … decision, and I will accept it if when I joined to the team, it leads to maximize the whole benefit
C. I will accept to join the project and I will make it false because it will be a common good
D. I will accept to join the project because it helps me to improve my technology knowledge

A

75
New cards

The Code of Ethics and Profession Conduct doesn't apply to whom?
A. All PMI members
B. Non-members who serve PMI in a volunteer capacity
C. Non-members who don't have any relationship with PMI
D. Non-members who apply to commence a PMI certification process
E. Individual who are not members of PMI but hold a PMI Certification

C

76
New cards

In virtue approach, an ethical action is_______
A. certain general conditions that are … equally to everyone's advantage.
B. an action respects the moral rights of everyone
C. certain ideals toward which we should strive
D. that provide the greatest balance of good over evil
E. A fair action

C

77
New cards

In Queen vs Dudley and Stephens case, the approach which was not discussed is ____


A. None of the others
B. Utilitarian approach
C. Common Good approach
D. Rights approach
E. Virtue approach
F. Fairness approach

F

78
New cards

What is bribery?
A. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
B. The act of lying in your personal profile and faking a required IT skill
C. The act of giving inaccurate or incomplete information about a fact.
D. The act of a party when it fails to comply with the terms and conditions of the contract
E. The act of illegally spread business information of the company that they once worked for
F. The act of appropriating commodities, services or property by deceiving or perform

A

79
New cards

How many articles are there in the policy suggested by VNISA?
A 5
B. 8
C. None of the above
D. 7
E. 6

B

80
New cards

What did Edward Snowden, a former technical staff of the National Security Agency, disclose?
A. Confidential information of PRISM Corporation
B. Confidential information of Tempura organization
C. Credit card information of many governmental officers
D. Confidential surveillance programs

D

81
New cards

Put the following chapters in PMI's Code of Ethics in the right order:

  1. Responsibility
  2. Honestly
  3. Fairness
  4. Vision and applicability
  5. Respect

A. 1-4-5-3-2
B. 1-5-3-2-4
C. 4-5-2-3-1
D. 4-1-5-3-2

D

82
New cards

Which Samsung's product is sued by Apple in German courts?
A. Galaxy Tab 10.1
B. Epic 4G
C. Nexus S
D. Galaxy S 4G

A

83
New cards

What does the Hackers Profiling Project do?
A. Investigates and hunts cyber-crimes
B. Latently support hackers and underground groups
C. Makes research into characteristics, abilities and socialization of hackers
D. Associates with hackers and underground groups to extort governments and other organizations

C

84
New cards

What may the aggrieved party do when there's a fundamental breach of the contract? (Choose 2 options)
A. Remain the contract' s validity and sue the offending party for current recall.
B. Cancel the contract, publish the information to the media
C. Remain the contract's and ask the offending party to pay compensation
D. Cancel the contract, require the offending party to pay compensation

A. A, D
B. B, C
C. C, A
D. A, B

A

85
New cards

What's the main cause that made Ecopark Project become a 'hot spot'?
A. The project was discovered to be related to bribery
B. People disagreed with the land compensation policy
C. There were so many people would like to come and live in Ecopark that it was overloaded
D. The price of apartments and houses in Ecopark were so high that people couldn't afford it

B

86
New cards

Who is DigiNotar?
A. A certificates selling company
B. A law company
C. A Linux distributor
D. A large technology corporation
E. A group of hackers to protest

A

87
New cards

In Glenn Greenwald's speech, "Why privacy matters?", according to Jeremy Bentham, what does the mass surveillance create?


A. A prison in mind
B. The power
C. The social orthodoxy
D. Social norms
E. Human shame
F. Insecurity

A

88
New cards

According to Professor Michael Sandel, what does philosophy do?


A. It teaches us how to think logically and find the true happiness that we haven't ever known before.
B. It shows us who we truly are and where we came from
C. It teaches and unsettles us by confronting us with what we already know.
D. It shows to that the politics is harmful to our pure spirit

C

89
New cards

What does BSA (Business Software Alliance) do?
A. Organize and operate the Software Business community.
B. Fight against widespread software copyright infringement.
C. Punish people who violate the software copyright
D. Manage the Business with Software together to dominate the world

B

90
New cards

Which Apple's intellectual property is listed by Apple to sue Samsung on April 15, 2011? (Choose all that apply)
A. patents
B. color
C. style
D. user interface
E. trade-marks
F. application (software)

A. A, C, D, E
B. A, B, C, D
C. B, D, E, F
D. A, C, E, F

A

91
New cards

Which deliberative process is the most related to Virtue Framework of decision making?
A. What am I doing and where did I come from on Earth?
B. What are my obligations in this situation and what are the things I should never do?
C. What kind of outcome should I produce?
D. What kind of person should I be and what my actions show about my character?

D

92
New cards

Which of the following are the examples of bribery?
A. Gifting birthday present to your co-worker so that he would be nice to you
B. Gifting money to your director so that he would promote you.
C. Gifting virus to your friend to surprise him
D. Gifting traditional biscuits to your business partners to show your hospitality.

B

93
New cards

Which of the following actions are consider as FP Software ISMS violations? (Choose all that apply)
A. Use Google Translate to understand documents given by customer.
B. Use freeware pTorrent to download document on the internet.
C. Setup on-product server with password "123456.'
D. Upload system architecture of the project to slideshare.com

A. A
B. B
C. C
D. D
E. All of the others

E

94
New cards

What are the bad effects of "having so many options" according to the paradox of choices? (Choose all that applied)
A. With so many options, people loose the freedom
B. With so many options, people find it easy to choose the wrong one
C. With so many options, people find it very difficult to choose at all.
D. With so many options, we end up less satisfied with the result of the choice than we would be if we had fewer options to choose from
A. A, B
B. C, D
C. A, C
D. A, D

B

95
New cards

Match basic relationships among people in society that Mencius generalized with the appropriate characteristic:
a. king-mandarins
b. parent-children
c. elder-younger siblings
d. husband-wife
e. friend-friend

  1. respectful
  2. filial piety
  3. role differentiation
  4. loyal
  5. belief

A. a-4, b-2, c-1, d-3, e-5
B. a-3, b-2, c-1, d-5, e-4
C. a-4, b-3, c-2, d-1, e-5
D. a-2, b-1, c-5, d-3, e-4

A

96
New cards

What is the similarity of 6 famous hacker all around the world in Misha Glenny's speech?
A. They are from Europe
B. They are good at mathematics and computer
C. They are good at phishing attack and DDOS
D. They are from US

B

97
New cards

Put the following steps of making decision into the correct order:

  1. Make a decision and consider it
  2. Consider the Parties Involved
  3. Gather all the Relevant Information
  4. Act
  5. Recognizing an Ethical Issue
  6. Reflect on the Outcome
  7. Formulate Actions and Consider Alternatives

A. 5-2-3-7-1-6-4
B. 5-3-2-7-1-4-6
C. 5-3-2-7-1-6-4
D. 5-2-3-7-1-4-6

B

98
New cards

Which of the following articles is NOT included in the Universal Declaration of Human Rights (United Nations, December 10, 1948)


A. No one shall be arbitrarily deprived of his property.
B. No one has the right to leave any country, including his own, and to return to his country.
C. No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.
D. No one shall be subjected to arbitrary arrest, detention or exile.

B

99
New cards

According to FPT Software ISMS, what does information security incident no lead to?
A. Financial losses and costs
B. Employment dismissal due to performance
C. Devaluation of intellectual property
D. Reputation and brand damage N.

B

100
New cards

Who is considered as the "father" of Confucianism?
A. Qian Zi
B. Kong Zi
C. Lao Zi
D. Cong Zi

B