Page 115 - Data Science class 11
P. 115

3.  It is through ______________________ that malicious individuals gain access to code and authentication systems via security
                  loopholes.
                  a.  Hacking                                        b.  Ransomware
                  c.  Denial of Service attack                       d.  Physical theft

               4.  Which among the following is not a source of outsider attack?
                  a.  Hackers at competitions trying to expose vulnerabilities for a prize or reward

                  b.  Foreign governments trying to gain access to a defense contractor to learn about the latest military
                     technology in development

                  c.  Cybercriminals trying to access financial info for financial gain
                  d.  Anyone who has authorised access to an organisation’s sensitive data

               5.  Trespassing onto a competitor's property or accessing their files without consent, impersonating an outside worker to
                  know company trade secrets and other sensitive information, etc. are the acts of ______________________.
                  a.  CEO phishing attacks                           b.  Password attack
                  c.  IP Spoofing                                    d.  Espionage

               6.  A well-defined ______________________ authorises an organisation to define guidelines and directives on data
                  management.
                  a.  data management policies                       b.  data governance framework
                  c.  e-governance framework                         d.  None of these

               7.  Till date, ______________________ holds the title for the largest data breach in the history of the internet.
                  a.  Google                                         b.  Facebook
                  c.  Yahoo                                          d.  Microsoft

            B.  State whether these statements are true or false.

               1.  Information about products and internal research is sensitive data.                   ______________
               2.  Hackers worldwide have become very active and are on the lookout to crack through a reputed
                  organisation's firewalls and steal important data from their servers.                  ______________
               3.  Data governance is defined as the decisions and actions of the people who run a school,
                  nation, city or business.                                                              ______________
               4.  Third-party apps often pose as genuine files or software and are therefore usually
                  installed by mistake.                                                                  ______________
               5.  Every cybercriminal aims to make money.                                               ______________


                 Standard Questions (Section B)


            A.  Short answer type questions:
               1.  Why are ethical norms necessary in research?
               2.  What do you mean by insider threats?
               3.  Define espionage.
               4.  Explain the term ‘data governance’.
               5.  Why are insider attacks threatening? Enlist any three reasons.





                                                                                        Ethics in Data Science  113
   110   111   112   113   114   115   116   117   118   119   120