- Description
IT 205 Week 5 Week Five Knowledge Check
Week 5 Knowledge Check
The material presented below is not meant to be a comprehensive list of all you need to know in the content area. Rather it is a starting point for building your knowledge and skills. Additional study materials are recommended in each area below to help you master the material.
Personalized Study Guide Results
Score 21 / 21
Concepts | Mastery | Questions |
Ethical Issues | 100% | · 1 · 2 · 3 |
Social and Political Issues | 100% | · 4 · 5 · 6 |
Moral Dimensions | 100% | · 7 · 8 · 9 |
Security | 100% | · 10 · 11 · 12 |
Control | 100% | · 13 · 14 · 15 |
Firewalls | 100% | · 16 · 17 · 18 |
Access Control | 100% | · 19 · 20 · 21 |
Concept: Ethical Issues
Mastery | 100% | Questions | · 1 · 2 · 3 |
Materials on the concept
- Basic Concepts: Responsibility, Accountability, and Liability
- 12.2. Ethics in an Information Society
- Five Moral Dimensions of the Information Age
- System Quality: Data Quality and System Errors
1.
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
due process
accountability
liability
analysis
2.
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within which moral dimension?
Property rights and obligations
System quality
Accountability and control
Information rights and obligations
3.
What is the most common source of business system failure?
Software bugs
Software errors
Data quality
Hardware or facilities failures
Concept: Social and Political Issues
Mastery | 100% | Questions | · 4 · 5 · 6 |
Materials on the concept
- Basic Concepts: Responsibility, Accountability, and Liability
- Key Technology Trends that Raise Ethical Issues
- A Model for Thinking About Ethical, Social, and Political Issues
4.
The feature of political systems in which a body of laws is in place that permits individuals to recover damages done to them by other actors, systems, or organizations is referred to as what feature?
Accountability
Responsibility
Liability
Due process
5.
What is NORA?
Profiling technology used by the EU
Federal privacy law protecting networked data
Data analysis technology that finds hidden connections between data in disparate sources
Guideline adopted in 1987 mandating stiff sentences on business executives
6.
Which term describes the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals?
Phishing
Spamming
Targeting
Profiling
Concept: Moral Dimensions
Mastery | 100% | Questions | · 7 · 8 · 9 |
Materials on the concept
- Internet Challenges to Privacy
- Technical Solutions
- Ethical Analysis
7.
When a cookie is created during a website visit, where is it stored?
On the website computer
On the visitor’s computer
On the ISP’s computer
In a web directory
8.
What is the main concern of the P3P standard?
Controlling pop-up ads
Allowing users to surf the web
Scrambling data
Blocking or limiting cookies
9.
Which of the five steps of an ethical analysis recommended in the text identifies individuals who have a vested interest in the situation?
Identify and clearly describe the facts.
Identify the stakeholders.
Identify options you can reasonably take.
Identify potential consequences of your actions
Concept: Security
Mastery | 100% | Questions | · 10 · 11 · 12 |
Materials on the concept
- 7.1. System Vulnerability and Abuse
- Internet Vulnerabilities
- Internal Threats: Employees
10.
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems?
Security
Controls
Benchmarking
Algorithms
11.
The Internet poses specific security problems because of which reason?
It changes so rapidly.
Internet standards are universal.
Internet data is not run over secure lines.
It was designed to be easily accessible
12.
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Wireless network
Employees
Authentication procedures
Lack of data encryption
Concept: Control
Mastery | 100% | Questions | · 13 · 14 · 15 |
Materials on the concept
- Information Systems Controls
- Identity Theft
13.
Which one of the following analyses of an information system identifies potential security issues as well as their associated costs?
Security policy audit
AUP
Risk assessment
Business impact analysis
14.
What types of controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or storage?
Software
Administrative
Data security
Implementation
15.
Which of the following types of controls are considered application controls?
Design, security, and organization controls
Application, hardware, and environment controls
Input, processing and output controls
Software, computer operation, and implementation controls
Concept: Firewalls
Mastery | 100% | Questions | · 16 · 17 · 1 |
Materials on the concept
- Firewalls, Intrusion Detection Systems, and Antivirus Software
- 7.4. Technologies and Tools for Protecting Information Resources
16.
Why does a business install a firewall?
To enforce a security policy on traffic between its network and the Internet
To check the accuracy of all transactions between its network and the Internet.
To create an enterprise system for business on the Internet.
To check the content of all incoming and out-going e-mail messages
17.
Which technology uses scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors?
Stateful inspections
Intrusion detection systems
Application proxy filtering technologies
Packet filtering technologies
18.
Which technique analyzes network communications to see whether packets are part of an ongoing dialogue between a sender and a receiver?
Stateful inspection
Intrusion detection system
Application proxy filtering
Packet filtering
Concept: Access Control
Mastery | 100% | Questions | · 19 · 20 · 21 |
Materials on the concept
- Encryption and Public Key Infrastructure
- Antivirus and Antispyware Software
19.
The current protocols that are used for secure transfer over the Internet are SSL, TLS, and what other protocol?
TCP/IP
CA
HTTP
S-HTTP
20.
What is the purpose of a digital certificate system?
Validate a user’s identity by using a third-party certificate authority (CA).
Validate a user’s identity using digital signatures.
Use computer tokens to validate a user’s identity.
It is used by individuals for personal correspondence
21.
Which of the following is antivirus software effective against?
Only those viruses active on the Internet and through e-mail
Any and all viruses on a PC
Only those viruses already known when the software is written
Any virus except those in wireless communications applications