Issues in Computing Unit
Schedule:
Available now. Due 12/06/2015 12:01 AM EST
Attempt 2 of 2
Started: 11/24/2015 1:16 AM
... [Show More] EST
Submitted: 12/05/2015 8:38 AM EST Score: 80%
Points: 160 out of 200
OLI quizzes are based entirely on material in the OLI module content, not on external resources or personal experience.
Question 1
Part 1: 10 out of 10
Part 2: 10 out of 10
Part 3: 10 out of 10
Points: 30 out of 30
Why do professional associations develop a code of conduct for members? Select Yes or No for each option.
To guide and govern the behaviors of its members
To ensure that the members demonstrate behaviors that reflect positively on the organization and that profession as a whole
To promote the highest professional ethical and standards among their members
Question 2
Points: 10 out of 10
How is “risk” defined in the context of information technology and information security?
· A risk is a security breach of a computer system or unauthorized access to an online account, file, or other resource.
· A risk is a security breach of a computer system, an account, a file, or another online resource but would never be the result of an
accidental action by a user.
· A risk is a potential compromise of a computer system, an account, a file, or another online resource and would most likely be perpetrated by a malicious attacker.
· A risk is a potential compromise of a computer system, an account, a file, or another online resource.
Question 3
Points: 10 out of 10
Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?
· Monitoring your privacy settings and adjusting as necessary
· Reading the privacy policy of the social networking site
· Minimizing interaction with others on the social network
· Posting photos of friends
Question 4
Points: 10 out of 10
What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?
Your name and address
· Your user ID and password
· Your driver’s license number and credit card number
Question 5
Points: 0 out of 10
The Digital Millennium Copyright Act .
· provided for internet service providers to be held harmless if copyright infringement occurs on their servers
· made file sharing illegal
· increased penalties for copyright infringement
· created a new definition of copyright
Question 6
Points: 10 out of 10
Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?
· Use your knowledge of organizational information in a responsible way
· Take care of any property assigned to you
· Use the organization’s supplies and services for official purposes only
· Maintain the security and confidentiality of your user ID and password
Question 7
Part 1: 10 out of 10
Part 2: 0 out of 10
Part 3: 10 out of 10
Points: 20 out of 30
You live “out in the middle of nowhere” and feel there is no need to protect your internet connection because there is no one that lives near you. One day you are unable to connect to the internet. After calling tech support you find that someone has hacked into your router and has changed all the settings. Fortunately the hacker only wanted to use your internet connection and did not view any information on your computer. Your decision to leave your router unprotected opened you to which of the following risks?
Select Yes or No for each option.
The confidentiality of the information on your computer
The integrity of the information on your computer
The accessibility to information
Question 8
Points: 10 out of 10
Unsolicited e-mail messages sent from advertisers or cyber criminals are .
Question 9
Points: 0 out of 10
Which of the following is good practice to ensure that you do not get malware on your computer from an online source?
· Update your antivirus software either manually or automatically each time you connect to the internet.
Do not open email attachments.
· Use only the latest version(s) of the browser(s) you normally use to access the internet.
· Block all popups (activate the popup blocker for all sites).
Question 10
Part 1: 10 out of 10
Part 2: 10 out of 10
Part 3: 0 out of 10
Points: 20 out of 30
Which of the following statements are true regarding PII? Select True or False for each option.
PII is information that uniquely identifies you in records that can be obtained online.
PII is always used to illegally gain access to your online records.
PII is safe because only you have this combination of name, social security number, and bank account, credit card numbers, or driver’s license number.
Question 11
Points: 10 out of 10
Which option here would be a way to remember the user IDs and passwords that poses less risk than other options listed.
· Use the same ID and password for all, and change them frequently (every 30 days).
· Use the same ID but a different password for all.
Scramble the IDs and passwords among the sites and keep a secure record somewhere.
· Create a base word/phrase and change the same 2-3 characters in that word/phrase for each site.
Question 12
Points: 10 out of 10
Would the following incident be an example of social engineering/phishing?
You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver’s license number and telephone number.
· Yes
· No
Question 13
Points: 10 out of 10
True or false? Online social networks are a totally safe environment in which to expand one’s contacts and meet people from any part of the world.
· True
· False
Question 14
Points: 10 out of 10
When would an employee typically agree to a user access agreement?
· Each time he or she logs on to the company network
· When changing a password
Once by signing a formal document when hired
· When new policies are adopted by the company [Show Less]