Introduction:
1、Cybersecurity Essentials Chapter 1 Quiz Questions Answers

2、Ethical Considerations in Hiring Hackers: Analyzing Issues and Solutions
Cybersecurity Essentials Chapter 1 Quiz Questions Answers ♂
Chapter 1: Cybersecurity – A World of Experts and Criminals
1. What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
ping sweep
DoS
spoof
2. What does the term vulnerability mean?
a known target or victim machine
a potential threat that a hacker creates
a computer that contains sensitive information
a method of attack to exploit a target
3. What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Protect and Defend
Securely Provision
Oversight and Development
4. Thwarting cyber criminals includes which of the following? (Choose two.)
hiring hackers
shutting down the network
changing operating systems
5. What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
DDoS
exhaustion
APT
6. Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
food
rock
flight
game
7. What name is given to a amateur hacker?
blue team
red hat
black hat
8. What name is given to hackers who hack for a cause?
white hat
hacker
blue hat
9. What does the term BYOD represent?
bring your own decision
bring your own disaster
buy your own disaster
10. What is an example of an Internet data domain?
Palo Alto
Cisco
Juniper
Ethical Considerations in Hiring Hackers: Analyzing Issues and Solutions ♂
We are faced with ethical issues in our interactions as human beings. Ethics can loosely be defined as a system of moral principles by which social conduct is judged as either “right” or “wrong”. As relates to business, ethics are moral principles which prescribe legitimate behavior in varied business dealings (Chryssides & Kaler, 1993). An interesting concept with regard to ethics is that there is no standardized approach to dealing with ethical dilemmas as they all spring from very unique legal, political, social and economic backgrounds.
This makes the task of dealing with ethical dilemmas especially challenging for managers. This paper will review a particular scenario that a senior manager faces as she seeks to hire staff. The particular ethical theory that may be applied to deal with the situation will be given and the rationale behind the decisions made extrapolated. All this shall be in a bid to elaborate that a good theoretical knowledge in ethics greatly assists deal with ethical issues
In the particular scenario, the senior manager is interviewing a young man who has the technical capacity to handle the job making him well suited for it. However, the potential employee has a record of engaging in illegal activities therefore shedding doubt as to his trustworthiness. Inevitably, the hacking background of the individual will have significant bearing as to the interviewee’s prospects with the company since the organization has highly sensitive datasets of personal information. At the bare minimal, the fact that the young man knowingly engaged in illegal activity highlights the fact that he has little regard for rules and regulations. While it might be argued that the moral standing of an individual does not have any implications as to his capability in the work setting, the organization stands being a victim of the employee’s misdeeds.
The ethical theory that the manager could use in coming up with her decision is utilitarianism which is considered to be the most influential ethical theory. This principle dictates that the collective welfare of the people overrides the individual’s right and as such, the theory advocates the maximization of happiness for the greatest number of people (Johnston, 2009). In this approach, the net benefit is calculated and the net consequences evaluated.
The initial perception of the manager as to the applicant’s personality is that of a qualified, mature and sociable person. To top it off, the applicant comes clean concerning his previous hacking activity thereby accentuating his honest nature. However, by applying the utilitarian theory, the HR manager must disregard this personal and professional attributes as she contemplates the effect that employing someone with a tarnished record can have on the company. The individual’s actions may have a negative impact on the company. Fredrick (2002) asserts that companies may be held criminally liable for the behavior of their employees despite the employees having acted on their own volition. As such, the prudent thing for Jenny to do would be to avoid hiring the young man despite his impressive résumé.
This paper set out to address the ethical issues that a manager charged with hiring staff faces when hiring a person with a record for illegal activities. From the discussions presented in this paper, it is clear that there are a number of factors that have to be taken into consideration when coming up with a solution. The Application of one of the ethical theories has been seen to assist in coming up with a sound solution to the issue. From this paper, it can authoritatively be stated that graceful resolution of the ethical issues faced in a business setting requires an in-depth knowledge of ethical theories.
Chryssides, D. G. & Kaler, H. J. (1993). An Introduction to Business Ethics. Cengage Learning EMEA.
Frederick, R. (2002). A Companion to Business Ethics. Wiley-Blackwell.
Related questions
Hiring a hacker to obtain personal information, including your own address, raises significant legal, ethical, and security concerns. Here’s a breakdown of the key issues and recommendations:
1. Legal Implications
- Unauthorized Access: If the hacker used illegal methods (e.g., breaching databases, phishing, social engineering), both you and the hacker could face criminal charges, even if the information is about you.
- Liability: Conspiring with a hacker may implicate you in cybercrime under laws like the Computer Fraud and Abuse Act (CFAA) in the U.S. or similar regulations globally.
2. Risks of Scams
- Fraudulent "Hackers": Many individuals posing as hackers are scammers. You may lose money, receive fake information, or have your personal data stolen and misused.
- Blackmail: A hacker could exploit your request to extort money or expose your actions.
3. Privacy and Security Concerns
- Exposure: If your address was intentionally hidden (e.g., for safety reasons), revealing it could jeopardize your security.
- Data Misuse: The hacker might access more than just your address, putting other sensitive information (financial, medical, etc.) at risk.
4. Ethical Alternatives
- Public Records: Use legitimate services to find your address (e.g., government portals, utility bills, or postal services).
- Cybersecurity Professionals: If testing your security, hire a certified ethical hacker or firm for a legal penetration test.
- Identity Protection Services: Use services like LifeLock or Experian to monitor and protect your personal data.
5. Next Steps if You Hired Someone
- Secure Your Data: Change passwords, enable two-factor authentication, and monitor accounts for suspicious activity.
- Report Scams: If defrauded, report to authorities like the FBI’s IC3 (U.S.), Action Fraud (UK), or your local cybercrime unit.
- Legal Advice: Consult an attorney to understand potential liabilities and mitigate risks.
Final Note
Hacking is illegal and unethical. Always seek lawful solutions to avoid severe consequences. If privacy or safety is a concern, contact professionals (lawyers, cybersecurity experts, or law enforcement) for guidance.

评论已关闭