IFSM201 Week 6 Quiz Latest 2021

Question

Dot Image

  Question 1 You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?

 

 

       A) The user access agreement

 

       B) The code of conduct

           

       C) The professional association code of ethics

 

 

Question 2 Where would you expect to find the following statement?

 

“I shall be willing to share my knowledge and expertise with others and always act in such a way that reflects favorably on my profession.”

 

Question 2 options:

 

  1. A code of ethical conduct for a professional organization.

 

       B) An employee code of conduct.

 

       C) A user access agreement.

 

Question 3What might members of a professional organization be doing when they refer to the organization’s code of ethics?

 

Question 3 options:

 

       A) Finding out whether a business practice is legal.

 

       B) Clarifying whether a business practice violates the code of ethics

 

       C) Finding out what fines are imposed for violating the code of ethics.

 

       D) Finding out how one becomes a member of the professional organization.

 

Question 4 Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?

 

       A) Posting photos of friends.

 

       B) Monitoring your privacy settings and adjusting as necessary.

 

       C) Minimizing interaction with others on the social network.

 

       D) Reading the privacy policy of the social networking site.

 

Question 5 (Yes/No). Using company-owned equipment and software, you write a software program as part of your job requirements. This is an original creation of yours, so are you free to use it outside of work and even sell it to others?

 

Question 5 options:

 

       A) Yes

    B) No

 

 

Question 6 If you are the holder of a copyright, the DCMA provides which of the following actions you should pursue if you see your copyrighted material posted on YouTube?

 

Question 6 options:

 

A) Using the copyright owners’ discussion board on YouTube to call attention to the infringement.

 

B) Issuing a takedown notice to YouTube.

 

C) Notifying law enforcement officials about the infringement.

 

 D) Removing the illegal post.

 

Question 7 Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

 

To discourage internet service providers from allowing file transfers. Question 7 options:

       A) Yes

       B) No

 

Question 8 Would the following be considered a purpose of the Digital Millennium Copyright Act? Select Yes or No.

 

To outline penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software.

 

Question 8 options:

 A) Yes  

 B) No

 

Question 9 Which of the following issues would most likely not be addressed in an employee code of conduct?

 

Question 9 options:

 

       A) Relationships with clients, suppliers, or people outside the company.

 

       B) Compensation tables for all employee categories.

 

       C) General employee conduct while at work.

 

       D) Sexual harassment.

 

Question 10 “While employed at this company, no information obtained in the course of employment may be used to advance personal gain, including financial reward.” In which of the documents below would this statement likely be found?

 

Question 10 options:

 

       A) A user access agreement

 

  1. An employee code of conduct

 

       C) A professional association code of conduct

 

 

Question 11 What is the typical relationship between a user access agreement and an employee code of conduct?

 

Question 11 options:

 

       A) An employee code of conduct is a legally binding version of a user access agreement.

 

       B) An employee code of conduct is usually one part of a user access agreement.

 

       C) A user access agreement is usually one part of an employee code of conduct.

 

 

D) A user access agreement specifies what penalties will be imposed when an employee violates the employee code of conduct.

 

Question 12 Would the following activity likely be or not be a violation of an employee code of conduct: John uses the color printer in his office to print copies of a flier he has created to publicize his company’s employee picnic.

 

Question 12 options:

 

       A) Likely a violation

 

B) Likely not a violation

 

Question 13 Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?

 

Question 13 options:

 

       A) Maintain the security and confidentiality of your user ID and password.

 

       B) Take care of any property assigned to you.

 

      C) Use your knowledge of organizational information in a responsible way.

 

       D) Use the organization’s supplies and services for official purposes only.

 

 

Question 14 (Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?

 

Question 14 options:

 

       A) Yes

 

       B) No

 

       C) Maybe

 

 

Question 15 (Yes/No). Kassandra is preparing to participate in a 5K run to raise money for a favorite charity. She sends out a solicitation on her company e-mail service to all company employees requesting sponsorship. Is this a violation of a typical user access agreement?

 

Question 15 options:

 

A) Yes

      

B) No

 

Save

 

Question 16 (True/False). Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses.

 

Question 16 options:

       A) True

 

B}False

 

Question 17 True or false? Online social networks are a totally safe environment in which to expand one’s contacts and meet people from any part of the world.

 

Question 17 options:

       A) True

 

B}False

 

Question 18 In the scenario below, identify which of the three dimensions is primarily threatened or compromised.

 

A virus begins changing Alfonso’s personal files.

 

Question 18 options:

 

       A) Confidentiality

 

       B) Integrity

 

       C) Availability

 

Question 19 A small company that keeps identical lists of employees in different departments runs the risk of a compromise to which aspect of that data?

 

Question 19 options:

 

       A) Confidentiality

 

       B) Integrity

 

       C) Availability

 

 

Question 20 (True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

 

Question 20 options:

      

A) True

 

B) False

 

Question 21 For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally identifiable information.

 

Sierra uses a long pass phrase such as “A stitch in time saves 9” with special characters between the words for her bank account password.

 

Question 21 options:

 

A) Good practice      

B) Bad practice

 

 

Question 22 (Yes/No). Would the following incident be an example of social engineering/phishing?

 

You receive an e-mail from the local police department asking you to update your information so that alerts can be sent out to you. The information requested includes your driver’s license number and telephone number.

 

Question 22 options:

 

A) Yes     

 B) No

 

Question 23 You have a long list of websites (more than 20) that you visit frequently, all of which require an ID and password to access the site and/or files stored there. What would be a risk free way to remember the user IDs and passwords for all these sites?

 

Question 23 options:

 

       A) Use the same ID and password for all, and change them frequently (every 30 days).

 

       B) Use the same ID but a different password for all.

 

       C) Scramble the IDs and passwords among the sites and keep a secure record somewhere.

 

Question 24 Lately, Sylvia’s home computer is super slow, and it restarts and shuts down without warning. The computer probably has a         .

 

Question 24 options:

 

A) virus

 B) worm

 

Question 25 What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?

 

Question 25 options:

 

       A) Your name and address.

 

       B) Your user ID and password.

 

       C) Your driver’s license number and credit card number.

 

Having Trouble Meeting Your Deadline?

Get your assignment on IFSM201 Week 6 Quiz Latest 2021 completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts