IT 205 Week 5 Week Five Knowledge Check

0 items
IT 205 Week 5 Week Five Knowledge Check
IT 205 Week 5 Week Five Knowledge Check
$6.99
  • Description

IT 205 Week 5 Week Five Knowledge Check

Week 5 Knowledge Check

The material presented below is not meant to be a comprehensive list of all you need to know in the content area. Rather it is a starting point for building your knowledge and skills. Additional study materials are recommended in each area below to help you master the material.

Personalized Study Guide Results

Score 21 / 21

ConceptsMasteryQuestions
Ethical Issues100%·         1

·         2

·         3

Social and Political Issues100%·         4

·         5

·         6

Moral Dimensions100%·         7

·         8

·         9

Security100%·         10

·         11

·         12

Control100%·         13

·         14

·         15

Firewalls100%·         16

·         17

·         18

Access Control100%·         19

·         20

·         21

Concept: Ethical Issues

Mastery100%Questions·         1

·         2

·         3

Materials on the concept

  • Basic Concepts: Responsibility, Accountability, and Liability
  • 12.2. Ethics in an Information Society
  • Five Moral Dimensions of the Information Age
  • System Quality: Data Quality and System Errors

1.

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

due process

accountability

liability

analysis

2.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within which moral dimension?

Property rights and obligations

System quality

Accountability and control

Information rights and obligations

3.

What is the most common source of business system failure?

Software bugs

Software errors

Data quality

Hardware or facilities failures

Concept: Social and Political Issues

Mastery100%Questions·         4

·         5

·         6

Materials on the concept

  • Basic Concepts: Responsibility, Accountability, and Liability
  • Key Technology Trends that Raise Ethical Issues
  • A Model for Thinking About Ethical, Social, and Political Issues

4.

The feature of political systems in which a body of laws is in place that permits individuals to recover damages done to them by other actors, systems, or organizations is referred to as what feature?

Accountability

Responsibility

Liability

Due process

5.

What is NORA?

Profiling technology used by the EU

Federal privacy law protecting networked data

Data analysis technology that finds hidden connections between data in disparate sources

Guideline adopted in 1987 mandating stiff sentences on business executives

6.

Which term describes the use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals?

Phishing

Spamming

Targeting

Profiling

Concept: Moral Dimensions

Mastery100%Questions·         7

·         8

·         9

Materials on the concept

  • Internet Challenges to Privacy
  • Technical Solutions
  • Ethical Analysis

7.

When a cookie is created during a website visit, where is it stored?

On the website computer

On the visitor’s computer

On the ISP’s computer

In a web directory

8.

What is the main concern of the P3P standard?

Controlling pop-up ads

Allowing users to surf the web

Scrambling data

Blocking or limiting cookies

9.

Which of the five steps of an ethical analysis recommended in the text identifies individuals who have a vested interest in the situation?

Identify and clearly describe the facts.

Identify the stakeholders.

Identify options you can reasonably take.

Identify potential consequences of your actions

Concept: Security

Mastery100%Questions·         10

·         11

·         12

Materials on the concept

  • 7.1. System Vulnerability and Abuse
  • Internet Vulnerabilities
  • Internal Threats: Employees

10.

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems?

Security

Controls

Benchmarking

Algorithms

11.

The Internet poses specific security problems because of which reason?

It changes so rapidly.

Internet standards are universal.

Internet data is not run over secure lines.

It was designed to be easily accessible

12.

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?

Wireless network

Employees

Authentication procedures

Lack of data encryption

Concept: Control

Mastery100%Questions·         13

·         14

·         15

Materials on the concept

  • Information Systems Controls
  • Identity Theft

13.

Which one of the following analyses of an information system identifies potential security issues as well as their associated costs?

Security policy audit

AUP

Risk assessment

Business impact analysis

14.

What types of controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or storage?

Software

Administrative

Data security

Implementation

15.

Which of the following types of controls are considered application controls?

Design, security, and organization controls

Application, hardware, and environment controls

Input, processing and output controls

Software, computer operation, and implementation controls

Concept: Firewalls

Mastery100%Questions·         16

·         17

·         1

Materials on the concept

  • Firewalls, Intrusion Detection Systems, and Antivirus Software
  • 7.4. Technologies and Tools for Protecting Information Resources

16.

Why does a business install a firewall?

To enforce a security policy on traffic between its network and the Internet

To check the accuracy of all transactions between its network and the Internet.

To create an enterprise system for business on the Internet.

To check the content of all incoming and out-going e-mail messages

17.

Which technology uses scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors?

Stateful inspections

Intrusion detection systems

Application proxy filtering technologies

Packet filtering technologies

18.

Which technique analyzes network communications to see whether packets are part of an ongoing dialogue between a sender and a receiver?

Stateful inspection

Intrusion detection system

Application proxy filtering

Packet filtering

Concept: Access Control

Mastery100%Questions·         19

·         20

·         21

Materials on the concept

  • Encryption and Public Key Infrastructure
  • Antivirus and Antispyware Software

19.

The current protocols that are used for secure transfer over the Internet are SSL, TLS, and what other protocol?

TCP/IP

CA

HTTP

S-HTTP

20.

What is the purpose of a digital certificate system?

Validate a user’s identity by using a third-party certificate authority (CA).

Validate a user’s identity using digital signatures.

Use computer tokens to validate a user’s identity.

It is used by individuals for personal correspondence

21.

Which of the following is antivirus software effective against?

Only those viruses active on the Internet and through e-mail

Any and all viruses on a PC

Only those viruses already known when the software is written

Any virus except those in wireless communications applications