Professional Skills & Issues (H) - 2018 Exam
1. The (UK) Data Protection Act 1984 was primarily focused on addressing the concerns of data misuse by what entities?
small independent traders.
individuals.
private members’ clubs.
large organisations.
2. The (UK) Data Protection Act 1998 introduced changes to data protection laws in the United Kingdom. What significant change did the act introduce?
personal data should not be transferred outside the United Kingdom, unless guaranteed adequate protection.
personal data could be repurposed for other uses, in specific cases.
religious views were reclassified as personal data.
personal data should not be transferred outside the European Economic Area (EEA), unless guaranteed adequate protection.
3. The (UK) Data Protection Act 1998 defines various terms. Which of the following accurately describes the role of the data controller?
the person that the data refers to.
the person who determines how or why personal data is processed.
the person who has access to personal data within an organisation.
the person who processes personal data within an organisation.
4. The (UK) Data Protection Act 1998 defined various personal data as sensitive. Which of the following is not considered sensitive data?
gender.
physical health.
mental health.
sexual orientation.
5. The (UK) Freedom of Information Act 2000 gives every citizen the right to request information from certain organisations. Which of the following is covered by the act?
environmental policies for any oil companies operating in the United Kingdom.
expenses paid to a university’s senior management.
the financial details of any scholarships provided by private businesses for children to attend private schools.
financial holdings for financial institutions, headquartered in the United Kingdom with more than 5,000 employees.
6. In European law, an Internet service provider (ISP) could be considered a mere conduit in which of the following circumstances?
they only transmit data up/downloaded by the customer.
they permanently store data uploaded by the customer.
they temporarily store downloaded data, to speed up future downloading of the same data.
they store downloaded data for no more than 12 weeks, to speed up future downloading of the same data.
7. A UK citizen has identified potentially unlawful content on the Internet, but is unsure that it is definitely unlawful. Which of the following actions would be the best first step?
report the content to the Internet Watch Foundation (IWF).
consult a legal professional.
report the content to the Internet service provider (ISP).
report the content to the local police office.
8. The Internet transcends national boundaries and jurisdictions. The Council of Europe (CoE) have approved a convention on cybercrime. Which of the following is not covered by the convention?
smartphone ownership, e.g. prisoners are not permitted to own one.
child pornography.
computer-related fraud.
criminal copyright infringement.
9. In European law, unsolicited e-mail is considered unlawful in which of the following scenarios?
the sender does not share the email address of the recipient with government organisations.
the sender has made it clear where they obtained the email address of the recipient.
the sender has concealed their email address.
the sender has attached images to the email.
10. In United States law, unsolicited email is considered lawful in which of the following scenarios?
unsolicited email contains no abusive or offensive language.
the recipient has been offered compensation for receiving unsolicited email.
the sender is a registered charity.
the recipient has not asked the sender to stop.
11. The (UK) Computer Misuse Act 1990 was enacted to combat misuse. Which of the following is not a criminal offence under the act?
unauthorised modification of the contents of any computer.
unauthorised access to any program/data held in any computer.
building or selling hackers’ toolkits.
intent to commit a serious offence with a computer.
12. The (UK) Police and Justice Act 2006 (PJA) enhanced the (UK) Computer Misuse Act (CMA) 1990. Which of the following was not directly addressed in the PJA act?
advanced persistent threats.
amended CMA to cover software tools intended to facilitate computer misuse.
increased maximum penalties for CMA offences
denial-of-service attacks
13. The (US) Computer Fraud and Abuse Act 1986 was enacted to combat misuse. What are the limits of penalties for first offences?
10 years in prison.
1 year in prison.
5 years in prison.
20 years in prison.
14. In UK law, which of the following is not an offence under the Computer Misuse Act (CMA) 1990?
disrupting operations of an organisation that is unlawfully harming the environment.
stealing commercially sensitive data
unauthorised modification of a company’s or individual’s web pages
accidentally spreading a virus or worm
15. In terms of intellectual property rights, what is the ‘obligation of confidence’ principle?
the right to copy documents, images, audio/video recordings, programs.
that employees are expected to report potentially unlawful activity with management, prior to reporting it to the media.
the expectation that consumers should have with regards to their personal data.
protection for confidential information received but not intended to be passed on to others.
16. The (UK) Copyright, Design and Patents Act 1988 is the primary copyright law in the United Kingdom. Which of the following is accurate in the case of source code?
boilerplate source code is protected under the act.
original source code is protected under the act.
closed source code is protected under the act.
open source code is protected under the act.
17. The (UK) Public Interest Disclosure Act 1998 (PIDA) provides protection for whistle-blowers. Which of the following scenarios would not be covered by the act?
whistle-blower reveals the concealment of illegal activity to upper management and a professional body.
whistle-blower reveals danger to health and safety in their workplace to their line-manager.
whistle-blower reveals the failure of the organisation to comply with legal obligations to upper management.
whistle-blower exposes unlawful environmental damage by the organisation to the national media.
18. What is a professional body?
an organisation that has complete control over the training and education of all individuals employed in a specific area.
an organisation that requires specialist qualifications to be a member.
an organisation that promotes high standards in a particular profession.
an organisation that controls the minimum payment and entitlements for professionals in a specific area.
19. What is a fixed-price software contract?
all costs agreed prior to commencement of software development, but all intellectual rights reside with the developer.
costs agreed prior to commencement of software development, penalty costs permitted in specific situations.
all costs agreed prior to commencement of software development, no additional charges may be applied.
costs are fixed for specific time-period of software development, beyond agreed time period costs can be renegotiated.
20. The (UK) Sale of Goods Act 1979 requires that goods sold must be fit for purpose. Under which of the following scenarios could a customer demand a refund, under the act?
customer purchases software designed for a specific platform (e.g. Microsoft Windows), but is unable to use it as they own a different platform (e.g. Mac OS).
customer discovers the software does not function as purported on the retail box.
customer purchases software, but discovers a more up-to-date version is available for purchase.
customer discovers within 3 days of purchase they can purchase the same software from an Internet-based vendor for significantly less.
Submit Quiz