Question details

Issues in Computing Unit | Rated A+
$ 5.00

Issues in Computing Unit

Schedule:

Available now. Due 12/06/2015 12:01 AM EST

 

Attempt 2 of 2

 

Started: 11/24/2015 1:16 AM EST

Submitted: 12/05/2015 8:38 AM EST Score: 80%

Points: 160 out of 200

 

OLI quizzes are based entirely on material in the OLI module content, not on external resources or personal experience.

Question 1

Part 1: 10 out of 10

Part 2: 10 out of 10

Part 3: 10 out of 10

Points: 30 out of 30

 

Why do professional associations develop a code of conduct for members? Select Yes or No for each option.

To guide and govern the behaviors of its members

 

 
 
 

 

 

 

 
 

To ensure that the members demonstrate behaviors that reflect positively on the organization and that profession as a whole

 

 

To promote the highest professional ethical and standards among their members

 

 
 
 

 

 

Question 2

Points: 10 out of 10

 

How is “risk” defined in the context of information technology and information security?

 

·                A risk is a security breach of a computer system or unauthorized access to an online account, file, or other resource.

·                A risk is a security breach of a computer system, an account, a file, or another online resource but would never be the result of an

accidental action by a user.

·                A risk is a potential compromise of a computer system, an account, a file, or another online resource and would most likely be perpetrated by a malicious attacker.

·      A risk is a potential compromise of a computer system, an account, a file, or another online resource.

 

Question 3

Points: 10 out of 10

Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?

 

·      Monitoring your privacy settings and adjusting as necessary

·      Reading the privacy policy of the social networking site

·      Minimizing interaction with others on the social network

·      Posting photos of friends

 

Question 4

Points: 10 out of 10

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?

 

  • Your name and address

·      Your user ID and password

·      Your driver’s license number and credit card number

 

Question 5

Points: 0 out of 10

The Digital Millennium Copyright Act                         .

 

·                provided for internet service providers to be held harmless if copyright infringement occurs on their servers

·      made file sharing illegal

·      increased penalties for copyright infringement

·      created a new definition of copyright

 

Question 6

Points: 10 out of 10

Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?

 

·                Use your knowledge of organizational information in a responsible way

·      Take care of any property assigned to you

·                Use the organization’s supplies and services for official purposes only

·                Maintain the security and confidentiality of your user ID and password

 

Question 7

Part 1: 10 out of 10

Part 2: 0 out of 10

Part 3: 10 out of 10

Points: 20 out of 30

 

You live “out in the middle of nowhere” and feel there is no need to protect your internet connection because there is no one that lives near you. One day you are unable to connect to the internet. After calling tech support you find that someone has hacked into your router and has changed all the settings. Fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. Your decision to leave your router unprotected opened you to which of the following risks?

Select Yes or No for each option.

 

The confidentiality of the information on your computer

 

 
 
 

 

 

The integrity of the information on your computer

 

 
 
 

 

 

This study resource wasshared via CourseHero.comThe accessibility to information

 

 
 
 

 

 

Question 8

Points: 10 out of 10

 

Unsolicited e-mail messages sent from advertisers or cyber criminals are                                                                                                                                                 .

Question 9

Points: 0 out of 10

Which of the following is good practice to ensure that you do not get malware on your computer from an online source?

 

·                Update your antivirus software either manually or automatically each time you connect to the internet.

 

  • Do not open email attachments.

·                Use only the latest version(s) of the browser(s) you normally use to access the internet.

·      Block all popups (activate the popup blocker for all sites).

Question 10

Part 1: 10 out of 10

Part 2: 10 out of 10

Part 3: 0 out of 10

Points: 20 out of 30

 

Which of the following statements are true regarding PII? Select True or False for each option.

PII is information that uniquely identifies you in records that can be obtained online.

 

 
 
 

 

 

This study resource wasPII is always used to illegally gain access to your online records.

 

 
 
 

 

 

 

 
 

shared via CourseHero.comPII is safe because only you have this combination of name, social security number, and bank account, credit card numbers, or driver’s license number.

 

 

Question 11

Points: 10 out of 10

Which option here would be a way to remember the user IDs and passwords that poses less risk than other options listed.

 

·                Use the same ID and password for all, and change them frequently (every 30 days).

·      Use the same ID but a different password for all.

 

  • Scramble the IDs and passwords among the sites and keep a secure record somewhere.

·                Create a base word/phrase and change the same 2-3 characters in that word/phrase for each site.

 

Question 12

Points: 10 out of 10

 

Would the following incident be an example of social engineering/phishing?

 

You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver’s license number and telephone number.

 

·      Yes

·      No

 

This study resource wasshared via CourseHero.comQuestion 13

Points: 10 out of 10

True or false? Online social networks are a totally safe environment in which to expand one’s contacts and meet people from any part of the world.

 

·      True

·      False

 

Question 14

Points: 10 out of 10

When would an employee typically agree to a user access agreement?

 

·      Each time he or she logs on to the company network

·      When changing a password

 

  • This study resource wasshared via CourseHero.comOnce by signing a formal document when hired

·      When new policies are adopted by the company

 

Available solutions