IT 205 Week 5 Week Five Knowledge Check

**********************************************
IT 205 Entire Course Link
https://uopcourses.com/category/it-205/
**********************************************
IT 205 Week 5 Week Five Knowledge Check

Week 5 Knowledge Check

The material presented
below is not meant to be a comprehensive list of all you need to know in the
content area. Rather it is a starting point for building your knowledge and
skills. Additional study materials are recommended in each area below to help
you master the material.

Personalized Study Guide Results 

Score
21 / 21






Concepts


Mastery


Questions





Ethical
Issues


100%


·        
1
·        
2
·        
3




Social and
Political Issues


100%


·        
4
·        
5
·        
6




Moral
Dimensions


100%


·        
7
·        
8
·        
9




Security


100%


·        
10
·        
11
·        
12




Control


100%


·        
13
·        
14
·        
15




Firewalls


100%


·        
16
·        
17
·        
18




Access
Control


100%


·        
19
·        
20
·        
21




Concept: Ethical Issues




Mastery


100%


Questions


·        
1
·        
2
·        
3




Materials on the concept


  • Basic Concepts: Responsibility, Accountability, and Liability

  • 12.2. Ethics in an Information Society

  • Five Moral Dimensions of the Information Age

  • System Quality: Data Quality and System Errors





1.

The feature of social institutions that means mechanisms are in
place to determine responsibility for an action is called

·        
A.

due process

·        
B.

accountability

·        
C.

liability

·        
D.

analysis





2.

In the information age, the obligations that individuals and
organizations have concerning rights to intellectual property fall within which
moral dimension?

·        
A.

Property rights and obligations

·        
B.

System quality

·        
C.

Accountability and control

·        
D.

Information rights and obligations





3.

What is the most common source of business system failure?

·        
A.

Software bugs

·        
B.

Software errors

·        
C.

Data quality

·        
D.

Hardware or facilities failures



Concept: Social and
Political Issues




Mastery


100%


Questions


·        
4
·        
5
·        
6




Materials on the concept


  • Basic Concepts: Responsibility, Accountability, and Liability

  • Key Technology Trends that Raise Ethical Issues

  • A Model for Thinking About Ethical, Social, and Political Issues





4.

The feature of political systems in which a body of laws is in
place that permits individuals to recover damages done to them by other actors,
systems, or organizations is referred to as what feature?

·        
A.

Accountability

·        
B.

Responsibility

·        
C.

Liability

·        
D.

Due process





5.

What is NORA?

·        
A.

Profiling technology used by the EU

·        
B.

Federal privacy law protecting networked data

·        
C.

Data analysis technology that finds hidden connections between
data in disparate sources

·        
D.

Guideline adopted in 1987 mandating stiff sentences on business
executives





6.

Which term describes the use of computers to combine data from
multiple sources and create electronic dossiers of detailed information on
individuals?

·        
A.

Phishing

·        
B.

Spamming

·        
C.

Targeting

·        
D.

Profiling



Concept: Moral Dimensions




Mastery


100%


Questions


·        
7
·        
8
·        
9




Materials on the concept


  • Internet Challenges to Privacy

  • Technical Solutions

  • Ethical Analysis





7.

When a cookie is created during a website visit, where is it
stored?

·        
A.

On the website computer

·        
B.

On the visitor’s computer

·        
C.

On the ISP’s computer

·        
D.

In a web directory





8.

What is the main concern of the P3P standard?

·        
A.

Controlling pop-up ads

·        
B.

Allowing users to surf the web

·        
C.

Scrambling data

·        
D.

Blocking or limiting cookies





9.

Which of the five steps of an ethical analysis recommended in the
text identifies individuals who have a vested interest in the situation?

·        
A.

Identify and clearly describe the facts.

·        
B.

Identify the stakeholders.

·        
C.

Identify options you can reasonably take.

·        
D.

Identify potential consequences of your actions



Concept: Security




Mastery


100%


Questions


·        
10
·        
11
·        
12




Materials on the concept


  • 7.1. System Vulnerability and Abuse

  • Internet Vulnerabilities

  • Internal Threats: Employees





10.

Which of the following refers to policies, procedures, and
technical measures used to prevent unauthorized access, alternation, theft, or
physical damage to information systems?

·        
A.

Security

·        
B.

Controls

·        
C.

Benchmarking

·        
D.

Algorithms





11.

The Internet poses specific security problems because of which
reason?

·        
A.

It changes so rapidly.

·        
B.

Internet standards are universal.

·        
C.

Internet data is not run over secure lines.

·        
D.

It was designed to be easily accessible





12.

You have been hired as a security consultant for a law firm. Which
of the following constitutes the greatest source of security threats to the
firm?

·        
A.

Wireless network

·        
B.

Employees

·        
C.

Authentication procedures

·        
D.

Lack of data encryption



Concept: Control




Mastery


100%


Questions


·        
13
·        
14
·        
15




Materials on the concept


  • Information Systems Controls

  • Identity Theft





13.

Which one of the following analyses of an information system
identifies potential security issues as well as their associated costs?

·        
A.

Security policy audit

·        
B.

AUP

·        
C.

Risk assessment

·        
D.

Business impact analysis





14.

What types of controls ensure that valuable business data files on
either disk or tape are not subject to unauthorized access, change, or
destruction while they are in use or storage?

·        
A.

Software

·        
B.

Administrative

·        
C.

Data security

·        
D.

Implementation





15.

Which of the following types of controls are considered
application controls?

·        
A.

Design, security, and organization controls

·        
B.

Application, hardware, and environment controls

·        
C.

Input, processing and output controls

·        
D.

Software, computer operation, and implementation controls



Concept: Firewalls




Mastery


100%


Questions


·        
16
·        
17
·        
1




Materials on the concept


  • Firewalls, Intrusion Detection Systems, and Antivirus Software

  • 7.4. Technologies and Tools for Protecting Information Resources





16.

Why does a business install a firewall?

·        
A.

To enforce a security policy on traffic between its network and
the Internet

·        
B.

To check the accuracy of all transactions between its network and
the Internet.

·        
C.

To create an enterprise system for business on the Internet.

·        
D.

To check the content of all incoming and out-going e-mail messages





17.

Which technology uses scanning software to look for known problems
such as bad passwords, the removal of important files, security attacks in
progress, and system administration errors?

·        
A.

Stateful inspections

·        
B.

Intrusion detection systems

·        
C.

Application proxy filtering technologies

·        
D.

Packet filtering technologies





18.

Which technique analyzes network communications to see whether packets
are part of an ongoing dialogue between a sender and a receiver?

·        
A.

Stateful inspection

·        
B.

Intrusion detection system

·        
C.

Application proxy filtering

·        
D.

Packet filtering



Concept: Access Control




Mastery


100%


Questions


·        
19
·        
20
·        
21




Materials on the concept


  • Encryption and Public Key Infrastructure

  • Antivirus and Antispyware Software





19.

The current protocols that are used for secure transfer over the
Internet are SSL, TLS, and what other protocol?

·        
A.

TCP/IP

·        
B.

CA

·        
C.

HTTP

·        
D.

S-HTTP





20.

What is the purpose of a digital certificate system?

·        
A.

Validate a user’s identity by using a third-party certificate
authority (CA).

·        
B.

Validate a user’s identity using digital signatures.

·        
C.

Use computer tokens to validate a user’s identity.

·        
D.

It is used by individuals for personal correspondence





21.

Which of the following is antivirus software effective against?

·        
A.

Only those viruses active on the Internet and through e-mail

·        
B.

Any and all viruses on a PC

·        
C.

Only those viruses already known when the software is written

·        
D.

Any virus except those in wireless communications applications

Powered by