University of Maryland IFSM 201 Quiz 6
Grade: 100%
ALL ANSWERS!!
Question 1 (0.2 points)
You are the owner of a small business. In the last
... [Show More] year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?
Question 1 options:
A) The user access agreement
B) The code of conduct
C) The professional association code of ethics
Save
________________________________________
Question 2 (0.2 points)
(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.
Question 2 options:
A) Yes
B) No
Save
Question 3 (0.2 points)
Where would you expect to find the following statement?
"I shall be willing to share my knowledge and expertise with others and always act in such a way that reflects favorably on my profession."
Question 3 options:
A) A code of ethical conduct for a professional organization.
B) An employee code of conduct.
C) A user access agreement.
Save
________________________________________
Question 4 (0.2 points)
Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?
Question 4 options:
A) Posting photos of friends.
B) Monitoring your privacy settings and adjusting as necessary.
C) Minimizing interaction with others on the social network.
D) Reading the privacy policy of the social networking site.
Save
________________________________________
Question 5 (0.2 points)
What does the Digital Millennium Copyright Act do?
Question 5 options:
A) Ensures that internet service providers (ISPs) have no penalties or obligations resulting from illegal software being posted on their sites.
B) Allows copying or distribution of copies of copyrighted software.
C) Provides penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.
D) Addresses only copyrighted software issues.
Save
________________________________________
Question 6 (0.2 points)
(Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?
Question 6 options:
A) Yes
B) No
Save
________________________________________
Question 7 (0.2 points)
Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.
To provide scenarios that define when it is legal to copy and sell copyrighted software.
Question 7 options:
A) Yes
B) No
Save
Question 8 (0.2 points)
(True/False). The Digital Millennium Copyright Act governs behavior of internet Service Providers but does not affect individuals on the internet.
Question 8 options:
True
False
Save
________________________________________
Question 9 (0.2 points)
Would the following activity likely be or not be a violation of an employee code of conduct: Joshua is running for a position on the local Parent/Teachers Association (PTA). In order to bolster his credentials for the position, he uses stationery from the college where he is employed.
Question 9 options:
A) Likely a violation
B) Likely not a violation
Save
Question 10 (0.2 points)
Would the following activity likely be or not be a violation of an employee code of conduct:
Tracey accepts two tickets from a supplier for a professional basketball game being played in his area.
Question 10 options:
A) Likely a violation
B) Likely not a violation
Save
________________________________________
Question 11 (0.2 points)
What is the typical relationship between a user access agreement and an employee code of conduct?
Question 11 options:
A) An employee code of conduct is a legally binding version of a user access agreement.
B) An employee code of conduct is usually one part of a user access agreement.
C) A user access agreement is usually one part of an employee code of conduct.
D) A user access agreement specifies what penalties will be imposed when an employee violates the employee code of conduct.
Save
Question 12 (0.2 points)
Would the following activity likely be or not be a violation of an employee code of conduct: Nora charges her personal cell phone in her cubicle at work.
Question 12 options:
A) Likely not a violation
B) Likely a violation
Save
________________________________________
Question 13 (0.2 points)
Would the following behavior most likely be a violation of an employee code of conduct?
Using your work computer to invite friends and co-workers to a party at your home.
Question 13 options:
A) Yes
B) No
C) More information is needed.
Save
________________________________________
Question 14 (0.2 points)
Jason has a part time job in the office of a construction company and is also a student at a community college. He often works on his homework during times when he is not busy at work because the office computer contains the software he needs to do his assignments and he hasn't been able to afford to purchase the software for his own personal computer. Which of these unacceptable uses typically included in a user access policy is he most likely engaging in?
Question 14 options:
A) Disclosing personal information about employees.
B) Using the network to download software for personal use.
C) Using a network account for a purpose not specified by the owner's job description.
D) Copying of copyrighted material.
Save
Question 15 (0.2 points)
(Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?
Question 15 options:
A) Yes
B) No
C) Maybe
Save
________________________________________
Question 16 (0.2 points)
In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?
Question 16 options:
A) Posting tips, project photos, and ideas on a hobby-related forum
B) Posting your resume on a job-seeking or job-posting site
C) Posting photos of oneself that might be considered risque or offensive
D) Posting vacation photos after you have returned home
Save
________________________________________
Question 17 (0.2 points)
True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world.
Question 17 options:
A) True
B) False
Save
________________________________________
Question 18 (0.2 points)
In the scenario below, identify which of the three dimensions is primarily threatened or compromised.
A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website.
Question 18 options:
A) Confidentiality
B) Integrity
C) Availability
Save
Question 19 (0.2 points)
(True/False). Making data secure means keeping it secret.
Question 19 options:
A) True
B) False
Save
________________________________________
Question 20 (0.2 points)
(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.
Question 20 options:
A) True
B) False
Save
________________________________________
Question 21 (0.2 points)
For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.
Terry uses the same password on most of his online accounts so that he can easily remember his login information.
Question 21 options:
A) Good practice
B) Bad practice
Save
________________________________________
Question 22 (0.2 points)
(Yes/No). Would the following incident be an example of social engineering/phishing?
You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver's license number and telephone number.
Question 22 options:
A) No
B) Yes
Save
________________________________________
Question 23 (0.2 points)
Which of the following describes what encrypting data means?
Question 23 options:
A) Information can be stored or transmitted via shared media without risking disclosure.
B) If you have lost the password for an encrypted file on your computer, you can still retrieve the data in that file.
C) Secure websites that employ encryption at the site or between your computer and the website will start with "http://".
Save
Question 24 (0.2 points)
Lately, Sylvia's home computer is super slow, and it restarts and shuts down without warning. The computer probably has a __________.
Question 24 options:
A) virus
B) worm
Save
________________________________________
Question 25 (0.2 points)
Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?
Question 25 options:
A) Your driver's license number
B) Your user ID and password
C) Your social security number
Save [Show Less]