Unit 5 of 5

Unit 5: Cybersecurity and IT Ethics

Study guide for DSST DSST Computing and Information TechnologyUnit 5: Cybersecurity and IT Ethics. Practice questions, key concepts, and exam tips.

38

Practice Questions

17

Flashcards

6

Key Topics

Key Concepts to Study

cybersecurity basics
malware
encryption
privacy
intellectual property
IT ethics and social impact

Sample Practice Questions

Try these 5 questions from this unit. Sign up for full access to all 38.

Q1MEDIUM

A company's IT department discovers that an employee has been using their work computer to download and share confidential company information outside of the organization. Which of the following actions should the company take first?

A) Immediately fire the employee for violating company policies
B) Conduct a thorough investigation to determine the extent of the breach, but allow the employee to continue working
C) Isolate the employee's computer from the network and conduct a thorough investigation to determine the extent of the breach
D) Send a warning email to all employees reminding them of the company's confidentiality policies
Show Answer

Answer: CThe correct answer, C, is to isolate the employee's computer from the network and conduct a thorough investigation. This is because the company needs to prevent any further breach of confidential information and gather evidence to determine the extent of the breach. Option A is incorrect because firing the employee without an investigation may be premature and could lead to legal issues. Option B is incorrect because allowing the employee to continue working could lead to further breaches. Option D is incorrect because while reminding employees of confidentiality policies is important, it does not address the immediate need to contain the breach.

Q2EASY

A company has a new policy that requires all employees to attend a security awareness training session. The primary purpose of this training is to educate employees on how to identify and prevent which of the following types of threats?

A) Network threats
B) Physical threats
C) Social engineering threats
D) Environmental threats
Show Answer

Answer: CThe correct answer is C) Social engineering threats. Security awareness training is primarily focused on educating employees to identify and prevent social engineering threats, such as phishing, pretexting, and baiting, which exploit human psychology rather than technical vulnerabilities. Option A) Network threats is incorrect because while network threats are a concern, they are not the primary focus of security awareness training. Option B) Physical threats is incorrect because physical threats, such as theft or damage to equipment, are not typically addressed in security awareness training. Option D) Environmental threats is incorrect because environmental threats, such as natural disasters, are not directly related to the purpose of security awareness training.

Q3MEDIUM

A company's IT department has discovered that an employee has been accessing sensitive customer data without authorization. The employee claims they were just trying to help a customer resolve an issue, but the IT department is unsure if this is true. What should the IT department do first in this situation?

A) Conduct an investigation to determine the employee's true intentions and gather evidence
B) Immediately terminate the employee for violating company security policies
C) Give the employee a warning and remind them of the company's security policies
D) Allow the employee to continue accessing the sensitive data since they claim it was for a legitimate purpose
Show Answer

Answer: AThe correct answer is A) Conduct an investigation to determine the employee's true intentions and gather evidence. This is because the IT department needs to gather all the facts before taking any disciplinary action. Jumping to conclusions or making assumptions without evidence could lead to unfair treatment of the employee or failure to address a potential security threat. Option B is incorrect because terminating the employee without an investigation could be premature and potentially unfair. Option C is incorrect because simply giving a warning may not be sufficient if the employee has indeed violated security policies. Option D is incorrect because allowing the employee to continue accessing sensitive data without verifying their story could put the company's data at risk.

Q4EASY

A company has a policy that all employees must lock their computers when leaving their desks. This policy is an example of which security concept?

A) Encryption
B) Firewalls
C) Access Control Lists
D) Physical Security
Show Answer

Answer: DThe correct answer is D) Physical Security, because the policy of locking computers is aimed at preventing unauthorized physical access to the devices. Option A) Encryption is incorrect because it refers to the protection of data through algorithms. Option B) Firewalls is incorrect because it refers to network security. Option C) Access Control Lists is incorrect because it refers to controlling access to resources based on user identity.

Q5HARD

A company's IT department has implemented a new security protocol that requires all employees to use two-factor authentication when accessing sensitive data. However, some employees are complaining that this new protocol is inconvenient and is slowing down their work. The company's security officer must balance the need for security with the need for employee productivity. What should the security officer do in this situation?

A) Eliminate the two-factor authentication requirement to improve employee productivity
B) Reduce the frequency of two-factor authentication to once a week
C) Provide training and support to help employees adapt to the new protocol and find ways to streamline their workflow
D) Ignore employee complaints and enforce the two-factor authentication requirement without any adjustments
Show Answer

Answer: CThe correct answer, C, is the most appropriate response because it balances the need for security with the need for employee productivity. By providing training and support, the security officer can help employees adapt to the new protocol and find ways to work more efficiently. Option A is incorrect because eliminating the two-factor authentication requirement would compromise the security of the company's data. Option B is incorrect because reducing the frequency of two-factor authentication would also compromise security. Option D is incorrect because ignoring employee complaints and enforcing the requirement without adjustments would be unfair and could lead to employee dissatisfaction and decreased productivity.

Ready to master Unit 5: Cybersecurity and IT Ethics?

Get unlimited practice questions, AI tutoring, flashcards, and a personalized study plan. Start free — no credit card required.

Study Tips for Unit 5: Cybersecurity and IT Ethics

  • Focus on understanding concepts, not memorizing facts — DSST tests application
  • Practice with timed questions to build exam-day speed
  • Review explanations for wrong answers — they reveal common misconceptions
  • Use flashcards for key terms, practice questions for deeper understanding

DSST® is a trademark owned by Prometric, which is not affiliated with, and does not endorse, this product.