IFSM 201 Spring 2018 Week 6 quiz

Asked by nerdygirl
Dated: 4th Dec'18 06:21 PM
Bounty offered: $32.00

Question 1 (0.2 points) IFSM 201 Spring 2018 Week 6 quiz I 

What is a benefit implied by holding membership in a professional association?

Question 1 options:

A) Your employer knows that you have subscribed to and adhere to the group's code of ethical conduct.

B) You have a blueprint for behaving ethically in all areas of your life.

C) You can claim that you are a subject matter expert in the field supported by the association.

Save

________________________________________

Question 2 (0.2 points)

Which of the following statements would be most likely to appear in a professional association's code of ethics for its members?

Question 2 options: 

A) I will be use organizational supplies for official purposes only.

B) I will maintain the confidentiality of my username and password.

C) I will use my network account only for the purpose specified in my job description.

D) I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.

Question 3 (0.2 points)

What might members of a professional organization be doing when they refer to the organization's code of ethics?

Question 3 options:

A) Finding out whether a business practice is legal.

B) Clarifying whether a business practice violates the code of ethics.

C) Finding out what fines are imposed for violating the code of ethics.

D) Finding out how one becomes a member of the professional organization.

Save

________________________________________

Question 4 (0.2 points)

(True/False). Although adults can be victims of cyberbullying, the term is most often referred to as online harassment directed toward minors.

Question 4 options:

A) True

B) False

Save

________________________________________

Question 5 (0.2 points)

You make a copy of a software application CD or DVD to lend to a friend. Is this legal?

Question 5 options:

A) Yes

B) No

Save

________________________________________

Question 6 (0.2 points)

(Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?

Question 6 options:

A) Yes

B) No

Save

________________________________________

Question 7 (0.2 points)

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

To outline penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.

Question 7 options:

A) Yes

B) No

Save

Question 8 (0.2 points)

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

To provide scenarios that define when it is legal to copy and sell copyrighted software.

Question 8 options:

A) Yes

B) No

Save

________________________________________

Question 9 (0.2 points)

Which of the following issues would most likely not be addressed in an employee code of conduct?

Question 9 options:

A) Relationships with clients, suppliers, or people outside the company.

B) Compensation tables for all employee categories.

C) General employee conduct while at work.

D) Sexual harassment.

Save

Question 10 (0.2 points)

Would the following activity likely be or not be a violation of an employee code of conduct: Joshua is running for a position on the local Parent/Teachers Association (PTA). In order to bolster his credentials for the position, he uses stationery from the college where he is employed.

Question 10 options:

A) Likely a violation

B) Likely not a violation

Save

________________________________________

Question 11 (0.2 points)

Which of the following is not a likely reason that specific password requirements, such as length, the use of special characters and the like, are usually guidelines in an organization rather than policies?

Question 11 options:

A) The specific password requirements can be changed more easily as needed if they are guidelines rather than policies.

B) Password guidelines are usually created and maintained by the IT department, which is in a better position to know best practices in password security.

C) Policies are created at a higher level in the "chain of command" and as such cannot be changed quickly in response to a particular security need.

D) Policies are not typically concerned with broad topics such as IT security and passwords.

Save

Question 12 (0.2 points)

Would the following activity likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company's employee picnic.

Question 12 options:

A) Likely a violation

B) Likely not a violation

Save

________________________________________

Question 13 (0.2 points)

Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?

Question 13 options:

A) Maintain the security and confidentiality of your user ID and password.

B) Take care of any property assigned to you.

C) Use your knowledge of organizational information in a responsible way.

D) Use the organization's supplies and services for official purposes only.

Save

________________________________________

Question 14 (0.2 points)

(Yes/No). Would the following be considered a violation of user access agreement?

Visiting social networking sites during lunch breaks.

Question 14 options:

A) Yes

B) No

C) Maybe

Save

Question 15 (0.2 points)

(Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?

Question 15 options:

A) Yes

B) No

C) Maybe

Save

________________________________________

Question 16 (0.2 points)

(True/False). Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses.

Question 16 options:

A) True

B) False

Save

________________________________________

Question 17 (0.2 points)

True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world.

Question 17 options:

A) True

B) False

Save

________________________________________

Question 18 (0.2 points)

In the scenario below, identify which of the three dimensions is primarily threatened or compromised.

A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website.

Question 18 options:

A) Confidentiality

B) Integrity

C) Availability

Save

Question 19 (0.2 points)

A small company that keeps identical lists of employees in different departments runs the risk of a compromise to which aspect of that data?

Question 19 options:

A) Confidentiality

B) Integrity

C) Availability

Save

________________________________________

Question 20 (0.2 points)

(True/False). Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

Question 20 options:

A) True

B) False

Save

________________________________________

Question 21 (0.2 points)

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.

Dale uses his first name as a password.

Question 21 options:

A) Good practice

B) Bad practice

Save

________________________________________

Question 22 (0.2 points)

Which of the following measures is likely to help you protect your PII?

Question 22 options:

A) Leaving your computer on when it's not in use to make returning to your work quicker.

B) Locking your computer in the back of your car, knowing that your car has an alarm.

C) Never enabling the "remember me" option on a social networking site.

Save

________________________________________

Question 23 (0.2 points)

Sam's bank advised him that his account was overdrawn. But Sam's records show he has $900 in his account. Sam learns from the bank that someone's been withdrawing money from his account online with his user ID and password. What did the cyber criminal likely use to steal Sam's account information?

Question 23 options:

A) Spyware

B) Viruses

Save

Question 24 (0.2 points)

You have a long list of websites (more than 20) that you visit frequently, all of which require an ID and password to access the site and/or files stored there. What would be a risk free way to remember the user IDs and passwords for all these sites?

Question 24 options:

A) Use the same ID and password for all, and change them frequently (every 30 days).

B) Use the same ID but a different password for all.

C) Scramble the IDs and passwords among the sites and keep a secure record somewhere.

D) Create a base word/phrase and change the same 2-3 characters in that word/phrase for each site.

Save

________________________________________

Question 25 (0.2 points)

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?

Question 25 options:

A) Your name and address.

B) Your user ID and password.

C) Your driver's license number and credit card number.

Save

IFSM 201 Spring 2018 Week 6 quiz
Answered by nerdygirl
Expert Rating: 200 Ratings
Dated: 4th Dec'18 06:21 PM
5 words and 1 attachment(s).
Tutorial Rating: Not Rated
Sold 0 times.
(preview of the tutorial; some sections have been intentionally blurred)
…Please…

attachments

IFSM-201-Spring-2018-Week-6-quiz.docx (119.54 KB)
Preview of IFSM-201-Spring-2018-Week-6-quiz.docx
likely     not   a violation     employee       uses   color printer     office       of   flier he     to       employee   Question 12     violationB) Likely       13 (0   points) Marissa maintains     on       site   always performs     her       sure   avoid visiting     at       has   upset by     policy       and   made comments     on       page   of the     of       conduct   Marissa violating?Question     the       of   user ID     B) Take       property   to you     knowledge       in   responsible way     organization's       for   purposes only     2       following   considered a     user       networking   during lunch     14       points) (Yes/No)   has a     business       her   time job     accountant,       company   database to     for       knows   so she     to       her   designed to     see       Is   acceptable use?Question     16 (0       networking   such services     Twitter,       have   significant changes     way       share   and experiences     these       from   theft and