University of Maryland IFSM 201 Week 6 Quiz
Attempt Score:
4.4 / 5 - 88 %
Overall Grade (last attempt): Highlighted in red the incorrect
... [Show More] answers
4.4 / 5 - 88 %
Question 1 (0.2 points)
What is a benefit implied by holding membership in a professional association?
Question 1 options:
A) Your employer knows that you have subscribed to and adhere to the group's code of ethical conduct.
B) You have a blueprint for behaving ethically in all areas of your life.
C) You can claim that you are a subject matter expert in the field supported by the association.
Save
________________________________________
Question 2 (0.2 points)
What might members of a professional organization be doing when they refer to the organization's code of ethics?
Question 2 options:
A) Finding out whether a business practice is legal.
B) Clarifying whether a business practice violates the code of ethics.
C) Finding out what fines are imposed for violating the code of ethics.
D) Finding out how one becomes a member of the professional organization.
Save
Question 3 (0.2 points)
(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.
Question 3 options:
A) Yes
B) No
Save
________________________________________
Question 4 (0.2 points)
Who is a cyberstalker?
Question 4 options:
A) The intended victim of repeated continuous, unwanted communication.
B) One whose online hostile behavior is intended to harm another or others.
C) A person whose online hostile behavior avoids confronting the victim face-to-face.
D) A person who acts alone and anonymously when targeting others with continuous, unwanted communications.
Save
________________________________________
Question 5 (0.2 points)
(Yes/No). Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?
Question 5 options:
A) Yes
B) No
Save
________________________________________
Question 6 (0.2 points)
(Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?
Question 6 options:
A) Yes
B) No
Save
________________________________________
Question 7 (0.2 points)
(True/False). A friend gives you his single-user copy of a copyrighted software application program so that you can load it on your computer. Both of you are guilty of an inappropriate use of digital content sharing.
Question 7 options:
True
False
Save
Question 8 (0.2 points)
Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.
To discourage internet service providers from allowing file transfers.
Question 8 options:
A) Yes
B) No
Save
________________________________________
Question 9 (0.2 points)
"While employed at this company, no information obtained in the course of employment may be used to advance personal gain, including financial reward." In which of the documents below would this statement likely be found?
Question 9 options:
A) A user access agreement
B) An employee code of conduct
C) A professional association code of conduct
Save
Question 10 (0.2 points)
Would the following activity likely be or not be a violation of an employee code of conduct: Joshua is running for a position on the local Parent/Teachers Association (PTA). In order to bolster his credentials for the position, he uses stationery from the college where he is employed.
Question 10 options:
A) Likely a violation
B) Likely not a violation
Save
________________________________________
Question 11 (0.2 points)
Would the following activity likely be or not be a violation of an employee code of conduct: Nora charges her personal cell phone in her cubicle at work.
Question 11 options:
A) Likely a violation
B) Likely not a violation
Save
Question 12 (0.2 points)
(True/False) An employee code of conduct will list illegal behaviors, but it will not list unethical behaviors.
Question 12 options:
A) True
B) False
Save
________________________________________
Question 13 (0.2 points)
Would the following behavior most likely be a violation of an employee code of conduct?
Using your work computer to invite friends and co-workers to a party at your home.
Question 13 options:
A) Yes
B) No
C) More information is needed.
Save
________________________________________
Question 14 (0.2 points)
(Yes/No). Kassandra is preparing to participate in a 5K run to raise money for a favorite charity. She sends out a solicitation on her company e-mail service to all company employees requesting sponsorship. Is this a violation of a typical user access agreement?
Question 14 options:
A) Yes
B) No
Save
Question 15 (0.2 points)
(Yes/No). Would the following be considered a violation of user access agreement?
Visiting social networking sites during lunch breaks.
Question 15 options:
A) Yes
B) No
C) Maybe
Save
________________________________________
Question 16 (0.2 points)
In the list below, which online social networking activity might be considered dangerous and possibly result in a negative outcome?
Question 16 options:
A) Posting tips, project photos, and ideas on a hobby-related forum
B) Posting your resume on a job-seeking or job-posting site
C) Posting photos of oneself that might be considered risque or offensive
D) Posting vacation photos after you have returned home
Save
________________________________________
Question 17 (0.2 points)
Which of the following is the biggest risk of using social networking?
Question 17 options:
A) An increase in spam delivered to your email account.
B) An increase in charges from the social networking provider.
C) An increase in likelihood of private information being disclosed.
D) An increase in ability to connect with others online.
Save
________________________________________
Question 18 (0.2 points)
In the scenario below, identify which of the three dimensions is primarily threatened or compromised.
A virus begins changing Alfonso's personal files.
Question 18 options:
A) Confidentiality
B) Integrity
C) Availability
Save
Question 19 (0.2 points)
In the scenario below, identify which of the three dimensions is primarily threatened or compromised.
A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website.
Question 19 options:
A) Confidentiality
B) Integrity
C) Availability
Save
________________________________________
Question 20 (0.2 points)
(True/False). Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.
Question 20 options:
A) True
B) False
Save
________________________________________
Question 21 (0.2 points)
For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.
Sierra uses a long pass phrase such as "A stitch in time saves 9" with special characters between the words for her bank account password.
Question 21 options:
A) Good practice
B) Bad practice
Save
________________________________________
Question 22 (0.2 points)
(Yes/No). Would the following incident be an example of social engineering/phishing?
You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver's license number and telephone number.
Question 22 options:
A) Yes
B) No
Save
________________________________________
Question 23 (0.2 points)
Lately, Sylvia's home computer is super slow, and it restarts and shuts down without warning. The computer probably has a __________.
Question 23 options:
A) virus
B) worm
Save
Question 24 (0.2 points)
You have a long list of websites (more than 20) that you visit frequently, all of which require an ID and password to access the site and/or files stored there. What would be a risk free way to remember the user IDs and passwords for all these sites?
Question 24 options:
A) Use the same ID and password for all, and change them frequently (every 30 days).
B) Use the same ID but a different password for all.
C) Scramble the IDs and passwords among the sites and keep a secure record somewhere.
D) Create a base word/phrase and change the same 2-3 characters in that word/phrase for each site.
Save
________________________________________
Question 25 (0.2 points)
Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?
Question 25 options:
A) Your driver's license number
B) Your user ID and password
C) Your social security number [Show Less]