This repository has been archived by the owner on Dec 25, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathite-key
5010 lines (2856 loc) · 173 KB
/
ite-key
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
c-----In his speech, Mikko Hypponen pointed out how many types of online attackers?
A. 2 types
B. 4 types
C. 3 types
D. 5 types
b-----Freedom of Expression is not recognized as a fundamental human right in human rights declaration of 1948 by The United Nations.
A. True
B. False
b-----Sedition is a representation of freedom of expression and it is legal.
A. True
B. False
a-----Barry Schwartz convinced that the more choices people have, the more freedom they have, and the more freedom they have, the more welfare they have.
A. True
B. False
a-----In the online attackers' portrait by Mikko, almost of online attackers are poor.
A. False
B. True
b-----The freedom of expression is guaranteed in dictatorships and totalitarian regimes.
A. True
B. False
b-----Hacktivists likes Anonymous group doing the hacking activities for laughs.
A. True
B. False
a-----Whistle blowing draws attention toward the act which poses threat to common interests such as .....
A. Neglecting, violating laws
B. Neglecting, violating moral values
C. Abusing or doing harm from employers
D. Abusing or doing harm from the whistle blower
A. A, B and C
B. B, D and A
C. B, C and D
D. A, C and D
d-----Which is the top secret information that Snowden leaked out?
A. The global surveillance programs leading by China and Russia governments.
B. The global safety programs leading by US and Ukraine governments.
C. The local surveillance programs leading by the cooperation of US and China governments.
D. The global surveillance programs leading by US and UK governments
a-----A gift may be considered a bribe if the gift is not made public.
A. True
B. False
a-----'Humaneness' is a political principle which is the main concept of operating a nation, connecting the world, reflecting the ideology of the democracy.
A. False
B. True
b-----What is PRISM?
A. Code name of Microsoft's window products
B. Code name of a surveillance program by NSA
C. Code name of a super clever program
D. Code name of Program Request Investigation for Security Management
c-----In his self-example, Barry Schwartz wanted to buy a new jean that is ....
A. a slim fit
B. an easy fit
C. None of the others
D. a button fly
E. a zipper fly
F. a relaxed fit
e-----In 1981, Elk Cloner was created by a fifteen-year old high school student, Richard Skrenta, holding responsible for the first large-scale computer virus outbreak in history. Which is the targeted system of Elk Cloner?
A. SCADA system
B. IBM PC
C. TENEX PC
D. BSD Unix
E. Apple II
a-----Which is implied by Dr. Sandel in two different cases?
A. Utilitarian is not the only approach people follow
B. Killing 1 person is worse than killing 5
C. There is only one way to make a decision by relying on utility
D. Killing 1 person for saving five people is a good choice
d-----Technique used in manufacturing a product is categorized into a ....
A. Patent
B. Trademark
C. Copyright
D. Trade secret
a-----Consequentialist ......
A. locates morality in the results from the act
B. locates morality in certain duties and rights
C. locates morality in the person who do the act
D. locates morality in the quality of the act
b-----To become a junzi-a man or "superior man" - a gentleman or a sage. in Confucianism, kindness. sobriety, righteousness, wisdom and trustworthiness are given to human-being with one-self to self-improve.
A. False
B. True
c-----In justice approach. an ethical action is ....
A. certain general conditions that are...equally to everyone's advantage
B. certain ideals toward which we should strive
C. A fair action
D. an action respects the moral rights of everyone
E. that provide the greatest balance of good over evil
d-----Which of the following is NOT one of common issues that can create friction between employers and IT workers?
A. Bribery
B. Providing False Information
C. Whistle-blowing
D. Provide too many options in the Job Interview
E. Fraud
F. Breach of Contract
b-----In the case of cannibal in Vietnam, the man who was arrested and punished in Lang Son is ___
A. A weak man
B. A mental illness man
C. A clever man
D. A strong man
d-----What will give you the right to exclude others from making your product?
A. Trade secret
B. Trademark
C. Copyright
D. Patent
b-----By introducing the four stories of Trolley car case and doctor case, Dr Sandel separated four ways to evaluate ethical aspects of an action.
A. True
B. False
a-----In his hackers' profiles, Misha Glenny found most of the hackers do not have which of the following?
A. Demonstration of any real social skills in the outside world
B. All of the others
C. Demonstration of Advanced ability in maths and sciences
a-----In rights approach, an ethical action is ___
A. an action respects the moral rights of everyone
B. certain ideals toward which we should strive
C. that provide the greatest balance of good over evil
D. A fair action
E. certain general conditions that are...equally to everyone's advantage
f-----In his speech, Mikko concluded these facts:
1. Criminals attack for an opinion
2. Hacktivists attack for protests
3. Nation states attack for protecting us
Which are wrong?
A. 1
B. 2
C. 2 and 3
D. 3
E. 1 and 2
F. 1 and 3
b-----Julian Assange, the founder of wikileaks. said that he and his organization didn't related to Snowden.
A. True
B. False
b-----In Misha Glenny speech. a website which became a sort of supermarket for cybercriminals is ___
A. Cards of Planet
B. CarderPlanet
C. PlanetCarder
D. Planet of Cards
b-----In Misha Glenny speech titled "Hire the hackers", he stated the facts that every companies in the world have been hacked even the cybersecurity services providers.
A. False
B. True
c-----In Glenn Greenwald's speech, United States and its partners has converted ____ once heralded as ___ of liberation and democratization.
A. The internet. best known tool
B. The intranet, best known tool
C. The internet, unprecedented tool
D. The intranet, unprecedented tool
d-----In utilitarian approach, an ethical action is __
A. an action respects the moral rights of everyone
B. certain ideals toward which we should strive
C. A fair action
D. that provide the greatest balance of good over evil
E. certain general conditions that are...equally to everyone's advantage
c-----What is the exclusive right to print, publish, record, etc. of an author on his original works?
A. Trademark
B. Trade secret
C. Copyright
D. Patent
c-----What is the first step to approach with ethical issues and also the most important task is ___
A. Learning the reasons
B. Learning by examples
C. Learning the facts
D. Learning the conventions
c-----The concept of Humaneness in Confucianism expressed by relationships of ___
A. Human-being with other human beings in society
B. Human-being with one-self
C. Both of the others
b-----In his speech. Glenn gave a shamed example of Eric Schmith behaviors that he ordered his employees at Google to cease speaking with the online Internet magazine Dot NET.
A. False
B. True
a-----In his self-example, Barry Schwartz spent an hour trying on all jeans available, and he had a better choice than before with the best-fitting jeans and he felt better.
A. False
B. True
d-----A symbol. word or words representing a company is considered as a __
A. Copyright
B. Trade secret
C. Patent
D. Trademark
a-----In Misha Glenny speech. a little research unit in Turin, Italy performed a research called "Hackers Profiling Project" investigating about ____ of the hackers
A. The characteristics, the abilities and the socialization
B. The phenomenon, the characteristics and the socialization
C. The phenomenon, the abilities and the socialization
D. The characteristics, the abilities and the phenomenon
d-----What is the way STUXNET virus worked?
1. Search
2. Update
3. Compromise
4. Infection
5. Deceive and Destroy
6. Control
A. 4->5->6->2->3->1
B. 1->2->3->4->5->6
C. 6->2->3->4->5->1
D. 4->1->2->3->6->5
E. 2->3->4->5->6->1
F. 2->4->5->1->3->6
c-----Who is a whistle-blower?
A. A person likes to work with media and gives false information about his organization
B. A person wants to increase the market shares of his organization by giving false information
C. A person normally holds information based on his expertise or position in the business committing violation
a-----In PMI's Code of Ethics, Fairness is ....
A. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
B. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
C. our duty to understand the truth and act in a truthful manner both in our communication
D. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.
d-----In PMI's Code of Ethics, Responsibility is .....
A. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
B. our duty to understand the truth and act in a truthful manner both in our communication
C. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.
D. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
a-----Anonymous is an international hacktivist group and they have a leader in US
A. False
B. True
a-----Online attackers are motivated only by making money.
A. False
B. True
b-----In his speech, Glenn indicates that a conflict in Mark Zuckerberg's behaviors while he said .. and his wife did what of the following activity?
A. Buy a new privacy license from the government
B. Buy a new house and 4 others around his home to protect his privacy
C. Sell a new house with fully security surveillance
D. Sell a privacy license for anyone using facebook
E. Buy a new car with 4 others from different manufacturer
b-----What are the similarities between the trolley car case and the case of the Doctor mentioned in Professor Sandel's speech?
A. Saving five people without killing one person
B. Killing one person to save five people
C. Saving one person without killing five people
D. Killing five people to save one person
c-----What is the process a conscientious worker should follow if he considers to become a whistle-blower
1. Direct his leaders' attention to the issue
2. If efforts to correct the problem through internal channels are hampered or ignored? Apparently, such actions will lead to negative consequences such as retaliation or dismissal.
3. Reporting the matter to outsiders, including federal or state legal agencies
4. Seek to solve the problem by using reasonable resource in the company
A. 1 -> 2 -> 3 -> 4
B. 2 -> 3 -> 4 -> 1
C. 1 -> 4 -> 2 -> 3
D. 2 -> 1 -> 4 -> 3
E. 1 -> 4 -> 3 -> 2
F. 1 -> 3 -> 2 -> 4
b-----The purpose of the Code of Ethics and Professional Conduct by PMI is ...
A. To shape by collective conduct of individual practitioners.
B. To instill confidence in the project management profession and to help an individual become a better practitioner
C. To advance our profession, both individually and collectively, by embracing the Code of Ethics and Professional Conduct
D. To assist in making wise decisions, particularly when faced with difficult situation where we may be asked to compromise our integrity or our values.
d-----Professor Sandel warned about the ...
A. Communism
B. Capitalism
C. Socialism
D. Skepticism
b-----Glenn convinced us to support for the mindset of "Bad people have things to hide, Good people have nothing to hide"
A.True
B. False
c-----BSA is made up of ....
A. Many lawyers
B. Many software developers
C. Many software companies
D. Many police men
c-----According to Barry Schwartz, the negative effects of all choices on people include:
A. D and B
B. C and D
C. A and B
D. A and D
E. B and C
A. It produces paralysis rather than liberation
B.Even if we manage to overcome the paralysis and make a choice, we end up less satisfied with the result of the choice than we would be if we had fewer options to choose from.
C. It produces less analysis time than less choices in making decision
D. Even if we can manage the analysis time and make a choice carefully, we ....
a-----What is a false information providing?
A. The act of giving inaccurate or incomplete information about a fact.
B. The act of illegally spread business information of the company that they once worked for
C. The act of a party when it fails to comply with the terms and conditions of the contract
D. The act of lying in your personal profile and faking a required IT skill
E. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
F. The act of appropriating commodities, services or property by deceiving or perform
d-----In his speech, Steve Vondran indicated these companies as example of BSA member...
A. IBM
B. Adobe
C. Apple
D. Facebook
E. Autodesk
F. Microsoft
(không thấy hết câu hỏi nên khả năng cao là hỏi công ty nào phải BSA member, vì chỉ được chọn 1 đáp án)
a-----The Information Security concept in FPT Software's Information Security Regulation is ..
A. Information Security is what keeps valuable information "free of danger"
B. Information Security determines the Confidentially, Integrity and Availability of Information
C. Information Security secures only the IT infrastructure
D. All of them
a-----According to Confucian conception, ethical norms and codes are ....
1. The three fundamental bonds the five constant virtues
2. The loyalty
3. The three obedience and the four virtues
4. The betrayal
A. 1, 2 and 3
B. All of the others
C. Only 3
D. 2 and 3
E. 1 and 2
F. Only 1
a-----Does freedom of speech give the right to offend?
A. No, it isn't
B. Yes, it is
d-----What is a breach of contract?
A. The act of giving inaccurate or incomplete information about fact
B. The act of appropriating commodities, services or property by deceiving or perform
C. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
D. The act of a party when it fails to comply with the terms and conditions of the contract
E. The act of illegally spread business information of the company that they once worked for
F. The act of lying in your personal profile and faking a required IT skill
b-----Categoricalist ...
A. locates morality in the location of the act
B. locates morality in certain duties and rights
C. locates morality in the results of the act
D. locates morality in the person who do the act
a-----What of the following is in SANS IT CODE OF ETHICS?
A. All of them
B. I treasure and will defend equality, justice and respect of others.
C. I respect intellectual property and will be careful to give credit for other's work. I will never steal or misuse copyrighted, patented material, trade secrets or any other intangible asset.
D. I will not injure others, their property, reputation, or employment by false or malicious
E. I will not steal property, time or resources
F. I will obtain permission before probing systems on a network for vulnerabilities
b-----What information has been stolen and published by hackers in Cyber attack on Vietnam airlines
A. A list of 200.000 regular clients
B. A list of 400.000 regular clients
C. A list of 200.000 VIP clients
D. A list of 600.000 VIP clients
b-----Which of the following is the motivation of online attackers:
1. By money
2. By the laughs
3. By an opinion
4. By protest
5. By no reason
A. 3, 4, 1, 5
B. 1, 2, 3, 4
C. 2, 3, 4, 5
D. 2, 3, 5, 1
E. 1, 2, 3, 5
b-----In Cat Tuong Salon case, In Dr. Tuong violated medical ethics?
A. It is clear that he didn't violated the ninth article of medical ethical regulation in 20...
B. It is still a question but he violated the regulations on medical examination and tre ... drugs or other medical services
C. He violated the ethics but he didn't violated the regulations on medical works
D. It is clear that he violated the seven vows of Hypocrate
a-----In Chapter 2 of the Code of Ethics for Information Security there are 4 articles regarding ..:
A. Society and Community, Working Attitude, Service Quality and Information Security
B. Society and Community, Writing Attitude, Service Quality and Information Security
C. Society and Community, Working Attitude, Service Quality and Identity System
D. Supplier Responsibility, Working Attitude, Service Quality and Information Security
E. Society and Community, Writing Attitude, Supplier Responsibility and Information Security
c-----In PMI's Code of Ethics, Honesty is ....
A. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
B. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
C. our duty to understand the truth and act in a truthful manner both in our communication
D. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.
b-----What is WRONG information about Nguyen Phi Hung - the "pioneer" hacker of Vietnamese hacker team joining in cyber-crime competition on world stage?
A. He used the hidden software recording keystrokes to know personal information
B. He was sentenced to 80 months in prison
C. He steal $638 from his fellows' bank accounts by using their personal information
D. He committed crime by an online game with a built-in Trojan program
e-----What is an inflating CV?
A. The act of a party when it fails to comply with the terms and conditions of the contract
B. The act of appropriating commodities, services or property by deceiving or perform
C. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
D. The act of giving inaccurate or incomplete information about a fact.
E. The act of lying in your personal profile and faking a required IT skill
F. The act of illegally spread business information of the company that they once worked for
e-----What is a fraud?
A. The act of a party when it fails to comply with the terms and conditions of the contract
B. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
C. The act of giving inaccurate or incomplete information about a fact.
D. The act of lying in your personal profile and faking a required IT skill
E. The act of appropriating commodities, services or property by deceiving or perform
F. The act of illegally spread business information of the company that they once worked for
b-----What of the following is NOT an Article in SANS IT CODE OF ETHICS?
A. I will not hesitate to seek assistance or guidance when faced with a task beyond my abilities or experience
B. I will advance private interests at the expense of end users, colleagues, or my employer
C. I will not steal property, time or resources.
D. I will strive to know myself and be honest about my capability
b-----The Code of Ethics for Information Security in Viet Name is originated by which organization?
A. VINASA
B. VNISA
C. VINFAST
D. VINATABA
b-----In PMI's Code of Ethics, Respect is ....
A. our duty to take ownership for the decisions we make or fail to make, the actions we take or fail to take, and the consequences that result.
B. our duty to show a high regard for ourselves, others, and the resources entrusted people, money, reputation, the safety of others, and natural or environmental resources.
C. our duty to make decisions and act impartially and objectively. Our conduct must be free from competing self interest, prejudice, and favoritism.
D. our duty to understand the truth and act in a truthful manner both in our communication
c-----In common-good approach, an ethical action is ...
A. that provide the greatest balance of good over evil
B. A fair action
C. certain general conditions that are ... equally to everyone's advantage.
D. certain ideals toward which we should strive
E. an action respects the moral rights of everyone
a-----What is Business Software Alliance (BSA)?
A. BSA is a trade group
B. BSA is a law enforcement
C. BSA is the software cops per se
D. BSA is a police group
a-----Imagine that your are a software developer in software company where your boss have ... Defense to develop a new kind of weapons with AI technologies, and he asked you to join. If follows virtue approach, what is the best choice?
A. I will reject to join the project because it will harm people
B. I will evaluate the balancing of the benefits and the costs of the project for the public, ... decision, and I will accept it if when I joined to the team, it leads to maximize the whole benefit
C. I will accept to join the project and I will make it false because it will be a common good
D. I will accept to join the project because it helps me to improve my technology knowledge
c-----The Code of Ethics and Profession Conduct doesn't apply to whom?
A. All PMI members
B. Non-members who serve PMI in a volunteer capacity
C. Non-members who don't have any relationship with PMI
D. Non-members who apply to commence a PMI certification process
E. Individual who are not members of PMI but hold a PMI Certification
c-----In virtue approach, an ethical action is ...
A. certain general conditions that are ... equally to everyone's advantage.
B. an action respects the moral rights of everyone
C. certain ideals toward which we should strive
D. that provide the greatest balance of good over evil
E. A fair action
f-----In Queen vs Dudley and Stephens case, the approach which was not discussed is ____
A. None of the others
B. Utilitarian approach
C. Common Good approach
D. Rights approach
E. Virtue approach
F. Fairness approach
a-----What is bribery?
A. The act of providing money, property or privilege to an individual working in a business or government to gain a business advantage
B. The act of lying in your personal profile and faking a required IT skill
C. The act of giving inaccurate or incomplete information about a fact.
D. The act of a party when it fails to comply with the terms and conditions of the contract
E. The act of illegally spread business information of the company that they once worked for
F. The act of appropriating commodities, services or property by deceiving or perform
b-----How many articles are there in the policy suggested by VNISA?
A 5
B. 8
C. None of the above
D. 7
E. 6
d-----What did Edward Snowden, a former technical staff of the National Security Agency, disclose?
A. Confidential information of PRISM Corporation
B. Confidential information of Tempura organization
C. Credit card information of many governmental officers
D. Confidential surveillance programs
d-----Put the following chapters in PMI's Code of Ethics in the right order:
1. Responsibility
2. Honestly
3. Fairness
4. Vision and applicability
5. Respect
A. 1-4-5-3-2
B. 1-5-3-2-4
C. 4-5-2-3-1
D. 4-1-5-3-2
a-----Which Samsung's product is sued by Apple in German courts?
A. Galaxy Tab 10.1
B. Epic 4G
C. Nexus S
D. Galaxy S 4G
c-----What does the Hackers Profiling Project do?
A. Investigates and hunts cyber-crimes
B. Latently support hackers and underground groups
C. Makes research into characteristics, abilities and socialization of hackers
D. Associates with hackers and underground groups to extort governments and other organizations
a-----What may the aggrieved party do when there's a fundamental breach of the contract? (Choose 2 options)
A. Remain the contract' s validity and sue the offending party for current recall.
B. Cancel the contract, publish the information to the media
C. Remain the contract's and ask the offending party to pay compensation
D. Cancel the contract, require the offending party to pay compensation
A. A, D
B. B, C
C. C, A
D. A, B
b-----What's the main cause that made Ecopark Project become a 'hot spot'?
A. The project was discovered to be related to bribery
B. People disagreed with the land compensation policy
C. There were so many people would like to come and live in Ecopark that it was overloaded
D. The price of apartments and houses in Ecopark were so high that people couldn't afford it
a-----Who is DigiNotar?
A. A certificates selling company
B. A law company
C. A Linux distributor
D. A large technology corporation
E. A group of hackers to protest
a-----In Glenn Greenwald's speech, "Why privacy matters?", according to Jeremy Bentham, what does the mass surveillance create?
A. A prison in mind
B. The power
C. The social orthodoxy
D. Social norms
E. Human shame
F. Insecurity
c-----According to Professor Michael Sandel, what does philosophy do?
A. It teaches us how to think logically and find the true happiness that we haven't ever known before.
B. It shows us who we truly are and where we came from
C. It teaches and unsettles us by confronting us with what we already know.
D. It shows to that the politics is harmful to our pure spirit
b-----What does BSA (Business Software Alliance) do?
A. Organize and operate the Software Business community.
B. Fight against widespread software copyright infringement.
C. Punish people who violate the software copyright
D. Manage the Business with Software together to dominate the world
a-----Which Apple's intellectual property is listed by Apple to sue Samsung on April 15, 2011? (Choose all that apply)
A. patents
B. color
C. style
D. user interface
E. trade-marks
F. application (software)
A. A, C, D, E
B. A, B, C, D
C. B, D, E, F
D. A, C, E, F
d-----Which deliberative process is the most related to Virtue Framework of decision making?
A. What am I doing and where did I come from on Earth?
B. What are my obligations in this situation and what are the things I should never do?
C. What kind of outcome should I produce?
D. What kind of person should I be and what my actions show about my character?
b-----Which of the following are the examples of bribery?
A. Gifting birthday present to your co-worker so that he would be nice to you
B. Gifting money to your director so that he would promote you.
C. Gifting virus to your friend to surprise him
D. Gifting traditional biscuits to your business partners to show your hospitality.
e-----Which of the following actions are consider as FP Software ISMS violations? (Choose all that apply)
A. Use Google Translate to understand documents given by customer.
B. Use freeware pTorrent to download document on the internet.
C. Setup on-product server with password "123456.'
D. Upload system architecture of the project to slideshare.com
A. A
B. B
C. C
D. D
E. All of the others
b-----What are the bad effects of "having so many options" according to the paradox of choices? (Choose all that applied)
A. With so many options, people loose the freedom
B. With so many options, people find it easy to choose the wrong one
C. With so many options, people find it very difficult to choose at all.
D. With so many options, we end up less satisfied with the result of the choice than we would be if we had fewer options to choose from
A. A, B
B. C, D
C. A, C
D. A, D
a-----Match basic relationships among people in society that Mencius generalized with the appropriate characteristic:
a. king-mandarins
b. parent-children
c. elder-younger siblings
d. husband-wife
e. friend-friend
1. respectful
2. filial piety
3. role differentiation
4. loyal
5. belief
A. a-4, b-2, c-1, d-3, e-5
B. a-3, b-2, c-1, d-5, e-4
C. a-4, b-3, c-2, d-1, e-5
D. a-2, b-1, c-5, d-3, e-4
b-----What is the similarity of 6 famous hacker all around the world in Misha Glenny's speech?
A. They are from Europe
B. They are good at mathematics and computer
C. They are good at phishing attack and DDOS
D. They are from US
b-----Put the following steps of making decision into the correct order:
1. Make a decision and consider it
2. Consider the Parties Involved
3. Gather all the Relevant Information
4. Act
5. Recognizing an Ethical Issue
6. Reflect on the Outcome
7. Formulate Actions and Consider Alternatives
A. 5-2-3-7-1-6-4
B. 5-3-2-7-1-4-6
C. 5-3-2-7-1-6-4
D. 5-2-3-7-1-4-6
b-----Which of the following articles is NOT included in the Universal Declaration of Human Rights (United Nations, December 10, 1948)
A. No one shall be arbitrarily deprived of his property.
B. No one has the right to leave any country, including his own, and to return to his country.
C. No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.
D. No one shall be subjected to arbitrary arrest, detention or exile.
b-----According to FPT Software ISMS, what does information security incident no lead to?
A. Financial losses and costs
B. Employment dismissal due to performance
C. Devaluation of intellectual property
D. Reputation and brand damage N.
b-----Who is considered as the "father" of Confucianism?
A. Qian Zi
B. Kong Zi
C. Lao Zi
D. Cong Zi
a-----Who are the "seeders" of Utilitarianism, who viewed happiness as the only good? (Choose all that applied)
A. Aristotle
B. Aristippus
C. Epicurus
D. Socrates
E. John Stuart Mill
F. Jeremy Bentham
A. B, C
B. D, E
C. A, F
D. E, F
c-----What does CIA in FPT Software ISMS stand for?
A. Compatibility, Information and Availability
B. Compatibility, Information and Availability
C. Confidentiality, Integrity and Availability
d-----What is Stunex?
A. A computer spyware
B. A computer trojan
C. A computer ransomware
D. A computer worm
E. None of the above
F. A computer adware
d-----How was VCCorp attacked on Monday, October 13, 2014?
A. Attackers added spyware to the server of VCCorp
B. Attackers added key logger to the server of VCCorp
C. Attackers tried to DDOS the system of VCCorp
D. Attackers faked users to install spyware
c-----Which the group of online attackers does Anonymous belong to?
A. Criminals who do it for money
B. Nation states
C. Hacktivist
D. Criminals who do it for being notorious
b-----How does the official dogma of all Western industrial societies run?
A. If we are interested in maximizing the freedom of our citizens, the way to do that is to maximize individual welfare.
B. If we are interested in maximizing the welfare of our citizens, the way to do that is to maximize individual freedom.
C. If we are interested in maximizing the choices of our citizens, the way to do that is to maximize individual freedom.
D. If we are interested in maximizing the choices of our citizens, the way to do that is to maximize individual welfare.
c-----According to Barry Schwartz, what's the "secret to happiness.?
A. Low carbon diet
B. Low living cost
C. Low expectation
D. High income
E. High living cost
F. High expectation
a-----What is the motivation of Duty Framework for decision making?
A. Aim is to perform the right action
B. Aim is to develop one's character
C. None of the above
D. Aim is to produce the most good
b-----Fill in the blank with the name of an intellectual property type:
The name "Coca cola" is an example of_________
A. patent
B. trade-mark
C. trade secrets
D. copyright
c-----Why should you care about intellectual property? (Choose all that applied)
A. Because individual values are in intellectual property
B. Because project values are in intellectual property
C. Because all values are in intellectual property
D. Because company values are in intellectual property
E. Because invention values are in intellectual property
A. A, B, C
B. A, D, E
C. B, D, E
D. B, C, D
a-----According to FPT Software ISMS, which of the following are examples of information? (Choose all that apply)
A. A photo
B. A Facebook post
C. A Skype message
D. A computer without hard disk
E. A meeting notes
F. A CPU chip
A. A, B, C, E
B. A, B, D, E
C. B, D, E, F
D. A, B, D, F
d-----Match the 4 types of IP to its corresponding definition.
IP types:
a. A patent
b. A trade-mark
c. A trade secret
d. A copyright
Definition:
1. is the right to exclude other people from making whatever you've created.
2. is with the author it lasts for the life of the author plus, a number of years that keeps increasing and so as an author.
3. is a recognizable sign, design, or expression which identifies products or services of a particular source from those of others.
4. is a formula, practice, process, design, instrument, pattern, commercial method, or compilation of information not generally known or reasonably ascertainable by others
A. a-3, b-4, c-2, d-1
B. a-1, b-2, c-3, d-4
C. a-2, b-1, c-4, d-3
D. a-1, b-3, c-4, d-2
d-----Which of the following are included in the Code of Ethics for IS in Vietnam?
A. Always tell the truth.
B. Organizations, businesses and individuals practicing in providing IS related services for other organizations/individuals are subjects of implication of IS Ethics.
C. Conflict of interests happens when Individuals/Organizations whose interests are affected in making decision related to other parties.
D. Do not abuse the trust given by individuals/organizations.
A. B, C
B. A, B
C. C, D
D. A, D
c, d-----Which of the following relations are considered in "humaneness" term in Confucianism? (Choose 2 options)
A. Relation between king and mandarines
B. Relation between father and son
C. Relation between human-being with oneself
D. Man-to-man relationE. Relation between husband and wife
f-----Fill in the blank:
_______is the act of appropriating commodities, services or property by deceiving or performing tricks.
A. Providing false information
B. Breach of contract
C. Whistle-blowing
D. Bribery
E. Inflating CV
F. Fraud
a-----Fill in the blank:
The _____ approach to ethics has its roots in the teachings of the ancient Greek philosopher Aristotle, who said that "equals should
be treated equally and unequals unequally''.
A. fairness or justice
B. common-good
C. rights
D. virtue
E. utilitarian
a-----Your Vice President of Sales decides to add more sales representatives for the summer based on analyses of sales trends over the last five years. What level of information is she acting on?
A.Wisdom
B.Data
C.Knowledge
D.Information
c-----You have collected social media posts with a specific hashtag for an analysis of the words used in the post? What kind of data is that?
A.Semi-Structured
B.Structured
C.Unstructured
c-----If you are doing an analysis of data to determine which of several small businesses you should purchase to gain the maximum benefit to your overall company finances, what type of analysis are you doing?
A.Predictive
B.Descriptive
C.Prescriptive
a-----If your company needs to do the same analysis as new data comes in every month, what is the best term to describe that process?
A.Pipeline
B.Workflow
a-----What is the Turing test used for?
A.To test whether an AI system is capable of thinking like a human being.
B.To test whether an AI system is capable of tricking a person into thinking it's another person.
C.To test whether an AI system is trustworthy.
a-----How is a Machine Learning (ML) system different from a Deep Learning (DL) system?
A.A ML system needs a human to provide the feature extraction.
B.A ML system does all of the feature extraction and classification.
C.A ML system learns from its mistakes.
a, b-----Why are deep learning and machine learning called narrow?