Ethics Module


Schedule:


Available now. Due
02/23/2014 11:59 PM EST



Top of Form



Question
1


Select one answer.


10 points


Marie has a part time business selling jewelry. At her full time
job as an accountant, she uses the company employee database to obtain
addresses for employees that she knows well so she invite them to a party at
her home designed to let them see and buy jewelry. Is this acceptable use?


·
Yes


·
No


·
Maybe


Question
2


Select one answer.


10 points


Which of the following is usually one of the purposes of a user
access agreement?


·
To prevent
employees from acting illegally


·
To inform employees
about acceptable and unacceptable uses of IT resources


·
To encourage
employees to create more secure passwords


·
To inform potential
employees of company IT policies


Question
3


Select one answer.


10 points


What is the purpose of a user access agreement?


·
to define all
approved uses of the company’s IT resources


·
to define every
sanction to be applied if a violation occurs


·
to outline in
general the acceptable and unacceptable use of IT resources


·
to outline all
acceptable and unacceptable behavior of all company employees


Question
4


Select one answer.


10 points


Would the following be considered a violation of a user access
agreement?


knowingly uploading or distributing files that contain viruses,
spyware, or any other similar software or programs that may damage the
operation of another’s computer


·
yes


·
no


·
maybe


Question
5


Select one answer.


10 points


“While employed at this company, no information obtained in the
course of employment may be used to advance personal gain, including financial
reward.” This statement would most likely be found in a:


·
user access
agreement


·
employee code of
conduct


·
professional
association code of conduct


Question
6


Select one answer.


10 points


Which of the following issues would most likely NOT be addressed
in an employee code of conduct?


·
relationships with
clients, suppliers, or people outside the company


·
compensation tables
for all employee categories


·
general employee
conduct while at work


·
sexual harassment


Question
7


Select one answer.


10 points


A friend shares a bootlegged copy of a movie on DVD. Are you in
violation of copyright laws by watching this DVD?


·
Yes. If you are
aware that it is bootlegged, you are as guilty as the person who created the
bootlegged copy in the first place.


·
No. Only the person
who made the bootlegged copy is guilty of violating copyright laws.


Question
8


Select one answer.


10 points


You make a copy of a software application CD or DVD to lend to a
friend. Is this legal?


·
yes


·
no


Question
9


Select one answer.


10 points


You download a copy of a software program that is “shareware.”
The download agreement specifies that you are allowed to freely download and
share the download link with others to try it out for 30 days. Since you are an
experienced programmer, you decide to alter the mechanism that causes the
program to stop functioning unless paid for after the 30 day trial, just in
case you don’t use it enough during the trial period to decide if you want to
buy it. Are you in violation of copyright law?


·
Yes


·
No


Question
10


Select one answer.


10 points


The Digital Millennium Copyright Act…


·
ensures that
Internet service providers (ISPs) have no penalties or obligations resulting
from illegal software being posted on their sites.


·
allows copying or
distribution of copies of copyrighted software.


·
provides penalties
for bypassing or providing tools to bypass protection mechanisms built into
copyrighted software.


·
addresses only
copyrighted software issues.


Question
11


Select one answer.


10 points


In the list below, which online social networking activity might
be considered dangerous and possibly result in a negative outcome?


·
Postings tips,
project photos, and ideas on a hobby-related forum.


·
Posting your resume
on a job-seeking or job-posting site.


·
Posting photos of
oneself that might be considered risqué or offensive.


·
Posting vacation
photos after you have returned home.


Question
12


Select one answer.


10 points


Which of the following statements is true?


·
Cyberbullies attack
only minors.


·
Cyberstalking is
the cyberbullying of an adult.


·
Cyberstalkers
rarely request face-to-face meetings with their victims.



Bottom of Form



Privacy
Module


Schedule:


Available now. Due
02/23/2014 11:59 PM EST



Top of Form



Question
1


Select one answer.


10 points


Gaining access to a user ID and password is most often used by
cyber criminals to


·
Burglarize houses
whose owners are on vacation


·
Steal personally
identifiable information in order to commit identity theft


·
Break into networks


·
Read personal
emails for the purpose of blackmailing


Question
2


Select one answer.


10 points


Would this incident be an example of social engineering?


Finding a music CD on the subway and playing it on your
computer.


·
yes


·
no


Question
3


Select one answer.


10 points


Social engineering is a technique used by those with a high
level of technical skills.


·
True


·
False


Question
4


Select one answer.


10 points


You are working as a receptionist at a real estate company. You
receive a phone call from one of the agents who asks for the email address of
another agent he needs to contact.


·
Social engineering


·
Not social
engineering


Question
5


Select one answer.


10 points


State the correct response to the following questions about
computer compromises.


Malware problems and other compromises of your computer
information are rare.


·
true


·
false


Question
6


Select one answer.


10 points


Which of the following is generally NOT considered PII?


·
Your library card
number


·
Your social
security number


·
Your driver license
number


·
Your bank account
number


Question
7


Select one answer.


10 points


Which of the following measures is least likely to help you
protect your PII?


·
logging off or
shutting down your computer when it’s not in use.


·
locking your
computer in the back of your car knowing that your car has an alarm.


·
keeping the
“remember me” button checked on a social networking site.


Question
8


Select one answer.


10 points


Can the following action be a result of your PII being
compromised.


Being denied access to your own bank account online.


·
yes


·
no


Question
9


Select one answer.


10 points


Indicate whether the following actions are the actions of a
person who will be a victim, or will not be a victim, of phishing attacks.


Deleting the attachment in an unexpected e-mail.


·
phishing victim


·
not a phishing
victim


Question
10


Select one answer.


10 points


Identify whether the following actions pose a risk of becoming a
phishing victim or do not pose a risk. Using a computer in his college’s open
lab, Oscar orders a textbook he needs from an online vendor by typing in their
url, using his credit card.


·
Not a risk of becoming
a phishing victim


·
Risk of becoming a
phishing victim


Question
11


Select one answer.


10 points


Indicate whether the following actions are the actions of a
person who will be a victim, or will not be a victim, of phishing attacks.


Clicking on a link to the URL https://www.g00gle.com.


·
phishing victim


·
not a phishing
victim


Question
12


Select one answer.


10 points


Which of the following emails is most likely to involve phishing


·
An email sent to
multiple recipients


·
An email from
someone you know


·
An email containing
a clickable url


·
An email that goes
to your email program’s spam folder


Question
13


Select one answer.


10 points


For the next question, indicate whether the actions are good
practices or bad practices to safeguard your personally identifiable
information. Anthony has spent time developing a super secure password. He now
uses it for all his accounts.


·
Good practice


·
Bad practice


Question
14


Select one answer.


10 points


For the next question, indicate whether the actions are good
practices or bad practices to safeguard your personally identifiable
information. You receive an email whose title line looks suspicious. Which of
the following actions is the safest?


·
Google the site the
email is coming from


·
Clicking an
“unsubscribe’ link in the email


·
Deleting the email
without opening


·
Putting the site in
your spam filter rules so you don’t receive any more emails


Question
15


Select one answer.


10 points


Marina’s personal computer requires a password to get access.


·
good practice


·
bad practice


Security
Module


Schedule:


Available now. Due
02/23/2014 11:59 PM EST



Top of Form



Question
1


Select one answer.


10 points


It’s more important to understand risk and compromise than it is
to use strong passwords.


·
true


·
false


Question
2


Select one answer.


10 points


A risk is a threat that a resource, for example a computer, may
be compromised.


·
True


·
False


Question
3


Select one answer.


10 points


The computer crashed just as Tatiana was accessing her e-mail.
The computer was scrapped because it couldn’t be fixed. The availability of
Tatiana’s e-mail is compromised.


·
true


·
false


Question
4


Select one answer.


10 points


Miguel has decided to use cloud storage. He needs to refer to
one of the files he has stored there, but his Internet service has been
interrupted by a power failure in his area. Which aspect of his resource (the
data he stored in the cloud) has been compromised?


·
Confidentiality


·
Integrity


·
Availability


Question
5


Select one answer.


10 points


Russell wrote his user ID and password to his work computer on a
piece of paper. He put the paper near his phone. He later realized that someone
could get into his account so he tore up the paper and threw it away. The
confidentiality of his account was compromised.


·
true


·
false


Question
6


Select one answer.


10 points


In the scenario below, identify which of the three dimensions is
primarily threatened or compromised.


The constant popups on his computer are making it difficult for
Alfonso to accomplish work that involves being on the Internet.


·
integrity


·
confidentiality


·
availability


Question
7


Select one answer.


10 points


A small company that keeps identical lists of employees in different
departments runs the risk of a compromise to which aspect of that data?


·
Availability


·
Confidentiality


·
Integrity


Question
8


Select one answer.


10 points


Which of the following is most likely to be spread by a USB
drive?


·
A virus


·
A Trojan horse


·
Spam


·
A worm


Question
9


Select one answer.


10 points


Sam’s bank advised him that his account was overdrawn. But Sam’s
records show he has $900 in his account. Sam learns from the bank that
someone’s been withdrawing money from his account online with his user ID and
password. What did the cybercriminal likely use to steal Sam’s account
information?


·
spyware


·
viruses


Question
10


Select one answer.


10 points


Which of the following is MOST likely to protect you against
cybercriminal attacks?


·
Having your email
program remember your password


·
Sharing your
password only for a good reason


·
Keeping your
software and operating system up to date


·
Using an easy to
remember password


Question
11


Select one answer.


10 points


A computer is completely compromised when it won’t turn on or
operate. The best way to fix it is:


·
have it fixed by a
computer professional


·
change all of your
passwords in your online accounts


Question
12


Select one answer.


10 points


Your computer shuts down every time you try to access the
Internet with your browser. Which of the following is the most likely cause?


·
Your computer has
been compromised.


·
Your Internet
connection is faulty.


·
Your browser needs
to be reinstalled.


·
Your identity has
been stolen.




Ethics,
Privacy, Security Unit


Schedule:


Available now. Due
02/23/2014 11:59 PM EST



Top of Form



Question
1


Select one answer.


10 points


Where would you expect to find the following statement?


“I shall be willing to share my knowledge and expertise with
others and always act in such a way that reflects favorably on my profession.”


·
code of ethical
conduct for a professional organization


·
employee code of
conduct


·
user access
agreement


Question
2


Select one answer.


10 points


Why do professional associations develop a code of conduct for
members?


·
to guide and govern
the behaviors of its members


·
to ensure that the
members demonstrate behaviors that reflect positively on the organization and
that profession as a whole


·
to promote the
highest professional ethical and standards among their members


·
all of the above:
professional associations self-regulate their members via a code of conduct.


·
none of the above:
professional associations do not have the power to regulate or direct the
behavior of their members


Question
3


Select one answer.


10 points


Donnell backed up the information on his computer every week on
a flash drive. Before copying the files to the flash drive, he aways ran a
virus scan against the files to ensure that no viruses were being copied to the
flash drive. He bought a new computer and inserted the flash drive so that he
could transfer his files onto the new computer. He got a message on the new
computer that the flash drive was corrupted and unreadable; the information on
the flash drive cannot be retrieved. Assuming that the flash drive is not
carrying a virus, this situation reflects which of the following:


·
compromise of the
security of the information on the flash drive.


·
risk of a potential
breach in the integrity of the data on the flash drive


·
neither


Question
4


Select one answer.


10 points


How is “compromise” defined in the context of information
technology and information security?


·
A compromise is a
security breach that is always perpetrated by a malicious attacker.


·
A compromise is the
potential for an intrusion into a computer system or unauthorized access to an
online account, file, or other resource.


·
A compromise is a
breach in the security of a computer system, an account, a file, or another
online resource.


·
A compromise is a
security breach that is never the result of an accidental action by a user.


Question
5


Select one answer.


10 points


Which of the following would most likely to prevent your
becoming a victim of cyberstalking while using social networking?


·
Posting photos of
friends


·
Reading the privacy
policy of the social networking site


·
Minimizing
interaction with others on the social network


·
Monitoring your
privacy settings and adjusting as necessary


Question
6


Select one answer.


10 points


The most vulnerable information that should be protected to
prevent unauthorized access to your online files and records is:


·
your name and
address


·
your user ID and
password


·
your driver’s
license number and credit card number


Question
7


Select one answer.


10 points


A friend gives you his single-user copy of a copyrighted
software application program so that you can load it on your computer. Who is
guilty of an inappropriate use of digital content sharing?


·
your friend


·
you


·
both of you


·
neither of you


Question
8


Select one answer.


10 points


One of the purposes of the Digital Millennium Copyright Act
is…


·
to discourage
Internet service providers from allowing file transfers.


·
to outline
penalties for bypassing or providing tools to bypass protection mechanisms
built into copyrighted software.


·
to provide
scenarios that define when it is legal to copy and sell copyrighted software.


·
none of the above.


Question
9


Select one answer.


10 points


Marissa maintains an account on a social networking site. She
always performs updates on her own time, making sure to avoid visiting the site
at work. Lately she has been upset by a new policy at her company and has made comments
about it on her social networking page. Which of the following parts of a Code
of Conduct is Marissa violating?


·
use your knowledge
of organizational information in a responsible way


·
take care of any
property assigned to you


·
maintain the
security and confidentiality of your user ID and password


·
use the
organization’s supplies and services for official purposes only


Question
10


Select one answer.


10 points


May holders of confidential information release it to authorized
users with permission?


·
yes


·
no


Question
11


Select one answer.


10 points


Medical records are protected by the Health Insurance
Portability and Accountability Act (HIPAA). Can your medical records be made
available to others who request this information (employers, insurance
companies, other doctors)?


·
Yes


·
No


Question
12


Select one answer.


10 points


The tools that cybercriminals often use, including computer
viruses, worms, trojan horses and spyware, are called:


·
malware


·
denial of service


·
hacking


·
spam


Question
13


Select one answer.


10 points


Which of the following is good practice to ensure that you do
not get malware on your computer from an online source?


·
Update your
antivirus software either manually or automatically each time you connect to
the internet.


·
Use only the latest
version(s) of the brower(s) you normally use to access the internet.


·
Block all popups
(activate the popup blocker for all sites).


·
Do not open email
attachments.


Question
14


Select one answer.


10 points


PII is:


·
information that
uniquely identifies you in records that can be obtained online.


·
always used to
illegally gain access to your online records.


·
safe because only
you have this combination of name, social security number, and bank account,
credit card numbers, or driver’s license number.


Question
15


Select one answer.


10 points


Encryption of data means that:


·
If you have lost
the password for an encrypted file on your computer, you can still retrieve the
data in that file.


·
information can be
stored or transmitted via shared media without risking disclosure


·
Secure websites
that employ encryption at the site or between your computer and the website
will start with “http://”


Question
16


Select one answer.


10 points


Sara is using her personal laptop (which is password protected)
at a “hotspot” at a local cafe with wifi access. She is in the middle
of placing an online order when friends arrive and she stops her work to visit.
What is her best (and most convenient) way to protect the PII that she has
already entered (she has only logged onto a site with her ID and password and
put some items in her basket for purchase)?


·
Exit all programs
and shut down the computer.


·
It is okay to stop
her work and leave the site open. Since she has not yet arrived at the Pay
information, her credit card information or pay type has not been entered.


·
Close the lid on
the laptop. In most cases this will put the computer in hibernate mode (closes
programs and shuts down the computer. All the programs and web pages that were
open will restart when the laptop is opened again.). Some information might be
lost on the order page, but that is safer than exposing her PII.


Question
17


Select one answer.


10 points


You log into your legitimate online classroom site with your
existing ID and password and are alerted that your password will expire in 14
days. You are directed to go to a Change Password site via a link on the login
page. Is it safe to continue to the link and change your password?


·
Yes


·
No


Question
18


Select one answer.


10 points


Online social networks are a totally safe environment in which
to expand one’s contacts and meet people from any part of the world.


·
True


·
False


Question
19


Select one answer.


10 points


What is the purpose of a user access agreement?


·
to outline all
acceptable and unacceptable behavior of all company employees


·
to outline every
sanction to be applied if a violation of the agreement occurs


·
to outline in
general the acceptable and unacceptable use of all company resources


·
to outline in
general approved and unapproved uses of the company’s IT resources


Question
20


Select one answer.


10 points