IFSM 201 Spring 2018 Week 6 quiz grades 96%

Question # 00712874 Posted By: spqr Updated on: 12/01/2018 12:15 AM Due on: 12/02/2018
Subject Business Topic General Business Tutorials:
Question
Dot Image

Question 1 (0.2 points) IFSM 201 Spring 2018 Week 6 quiz I got a 96%

 

What is a benefit implied by holding membership in a professional association?

Question 1 options:

 

A)           Your employer knows that you have subscribed to and adhere to the group's code of ethical conduct.

 

 

B)            You have a blueprint for behaving ethically in all areas of your life.

 

 

C)            You can claim that you are a subject matter expert in the field supported by the association.

 

Save

________________________________________

Question 2 (0.2 points)

 

Which of the following statements would be most likely to appear in a professional association's code of ethics for its members?

Question 2 options: I got this Question WRONG

 

A)           I will be use organizational supplies for official purposes only.

 

 

B)            I will maintain the confidentiality of my username and password.

 

 

C)            I will use my network account only for the purpose specified in my job description.

 

 

D)           I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.

 

 

 

 

 

 

Question 3 (0.2 points)

 

What might members of a professional organization be doing when they refer to the organization's code of ethics?

Question 3 options:

 

A)           Finding out whether a business practice is legal.

 

 

B)            Clarifying whether a business practice violates the code of ethics.

 

 

C)            Finding out what fines are imposed for violating the code of ethics.

 

 

D)           Finding out how one becomes a member of the professional organization.

 

Save

________________________________________

Question 4 (0.2 points)

 

(True/False).  Although adults can be victims of cyberbullying, the term is most often referred to as online harassment directed toward minors.

Question 4 options:

 

A) True

 

B) False

Save

________________________________________

 

 

 

 

 

 

 

 

 

Question 5 (0.2 points)

 

You make a copy of a software application CD or DVD to lend to a friend. Is this legal?

Question 5 options:

 

A)           Yes

 

 

B)            No

 

Save

________________________________________

Question 6 (0.2 points)

 

(Yes/No). You download a copy of a software program that is "shareware." The download agreement specifies that you are allowed to freely download and share the download link with others to try it out for 30 days. Since you are an experienced programmer, you decide to alter the mechanism that causes the program to stop functioning unless paid for after the 30 day trial, just in case you don't use it enough during the trial period to decide if you want to buy it. Are you in violation of copyright law?

Question 6 options:

 

A)           Yes

 

 

B)            No

 

Save

 

________________________________________

Question 7 (0.2 points)

 

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

To outline penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.

Question 7 options:

 

A)           Yes

 

 

B)            No

 

Save

Question 8 (0.2 points)

 

Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

To provide scenarios that define when it is legal to copy and sell copyrighted software.

Question 8 options:

 

A)           Yes

 

 

B)            No

 

Save

________________________________________

 

 

 

 

 

 

Question 9 (0.2 points)

 

Which of the following issues would most likely not be addressed in an employee code of conduct?

Question 9 options:

 

A)           Relationships with clients, suppliers, or people outside the company.

 

 

B)            Compensation tables for all employee categories.

 

 

C)            General employee conduct while at work.

 

 

D)           Sexual harassment.

 

Save

Question 10 (0.2 points)

 

Would the following activity likely be or not be a violation of an employee code of conduct: Joshua is running for a position on the local Parent/Teachers Association (PTA). In order to bolster his credentials for the position, he uses stationery from the college where he is employed.

Question 10 options:

 

A)           Likely a violation

 

 

B)            Likely not a violation

 

Save

________________________________________

 

Question 11 (0.2 points)

 

Which of the following is not a likely reason that specific password requirements, such as length, the use of special characters and the like, are usually guidelines in an organization rather than policies?

Question 11 options:

 

A)           The specific password requirements can be changed more easily as needed if they are guidelines rather than policies.

 

 

B)            Password guidelines are usually created and maintained by the IT department, which is in a better position to know best practices in password security.

 

 

C)            Policies are created at a higher level in the "chain of command" and as such cannot be changed quickly in response to a particular security need.

 

 

D)           Policies are not typically concerned with broad topics such as IT security and passwords.

 

Save

Question 12 (0.2 points)

 

Would the following activity likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company's employee picnic.

Question 12 options:

 

A)           Likely a violation

 

 

B)            Likely not a violation

 

Save

________________________________________

 

Question 13 (0.2 points)

 

Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?

Question 13 options:

 

A)           Maintain the security and confidentiality of your user ID and password.

 

 

B)            Take care of any property assigned to you.

 

 

C)            Use your knowledge of organizational information in a responsible way.

 

 

D)           Use the organization's supplies and services for official purposes only.

 

Save

________________________________________

Question 14 (0.2 points)

 

(Yes/No). Would the following be considered a violation of user access agreement?

Visiting social networking sites during lunch breaks.

Question 14 options:

 

A)           Yes

 

 

B)            No

 

 

C)            Maybe

 

Save

Question 15 (0.2 points)

 

(Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?

Question 15 options:

 

A)           Yes

 

 

B)            No

 

 

C)            Maybe

 

Save

________________________________________

Question 16 (0.2 points)

 

(True/False). Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses.

Question 16 options:

 

A) True

 

B) False

Save

________________________________________

 

 

Question 17 (0.2 points)

 

True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world.

Question 17 options:

 

A) True

 

B) False

Save

________________________________________

Question 18 (0.2 points)

 

In the scenario below, identify which of the three dimensions is primarily threatened or compromised.

A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website.

Question 18 options:

 

A)           Confidentiality

 

 

B)            Integrity

 

 

C)            Availability

 

Save

 

 

 

 

 

 

Question 19 (0.2 points)

 

A small company that keeps identical lists of employees in different departments runs the risk of a compromise to which aspect of that data?

Question 19 options:

 

A)           Confidentiality

 

 

B)            Integrity

 

 

C)            Availability

 

Save

________________________________________

Question 20 (0.2 points)

 

(True/False). Risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems and networks, and antivirus protection.

Question 20 options:

 

A) True

 

B) False

Save

________________________________________

 

 

 

 

 

 

 

Question 21 (0.2 points)

 

For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.

Dale uses his first name as a password.

Question 21 options:

 

A)           Good practice

 

 

B)            Bad practice

 

Save

________________________________________

Question 22 (0.2 points)

 

Which of the following measures is likely to help you protect your PII?

Question 22 options:

 

A)           Leaving your computer on when it's not in use to make returning to your work quicker.

 

 

B)            Locking your computer in the back of your car, knowing that your car has an alarm.

 

 

C)            Never enabling the "remember me" option on a social networking site.

 

Save

________________________________________

 

 

 

 

Question 23 (0.2 points)

 

Sam's bank advised him that his account was overdrawn. But Sam's records show he has $900 in his account. Sam learns from the bank that someone's been withdrawing money from his account online with his user ID and password. What did the cyber criminal likely use to steal Sam's account information?

Question 23 options:

 

A)           Spyware

 

 

B)            Viruses

 

Save

Question 24 (0.2 points)

 

You have a long list of websites (more than 20) that you visit frequently, all of which require an ID and password to access the site and/or files stored there. What would be a risk free way to remember the user IDs and passwords for all these sites?

Question 24 options:

 

A)           Use the same ID and password for all, and change them frequently (every 30 days).

 

 

B)            Use the same ID but a different password for all.

 

 

C)            Scramble the IDs and passwords among the sites and keep a secure record somewhere.

 

 

D)           Create a base word/phrase and change the same 2-3 characters in that word/phrase for each site.

 

Save

________________________________________

 

Question 25 (0.2 points)

 

What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?

Question 25 options:

 

A)           Your name and address.

 

 

B)            Your user ID and password.

 

 

C)            Your driver's license number and credit card number.

 

Save

Dot Image
Tutorials for this Question
  1. Tutorial # 00713160 Posted By: spqr Posted on: 12/01/2018 12:15 AM
    Puchased By: 3
    Tutorial Preview
    The solution of IFSM 201 Spring 2018 Week 6 quiz grades 96%...
    Attachments
    docxgggggggrre34tyyyy.docx (119.66 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    m...uma Rating Top-quality and well-detailed work 01/01/2019

Great! We have found the solution of this question!

Whatsapp Lisa