100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

IDSC 3001 FINAL Exam Questions With Correct Answer

Beoordeling
-
Verkocht
-
Pagina's
17
Cijfer
A+
Geüpload op
28-08-2024
Geschreven in
2024/2025

©THEBRIGHT EXAM STUDY SOLUTIONS 8/27/2024 12:01 PM IDSC 3001 FINAL Exam Questions With Correct Answers Information Ethics - answerethical issues associated with the development and application of information technologies Stakeholder Theory - answerA theory that holds that social responsibility is paying attention to the interest of every affected stakeholder in every aspect of a firm's operation · Anyone but the stockholder is a means to an end of profitability · Executives can only spend funds in ways that have been approved by the stakeholders · Through legal and ethical means, and with a long-term orientation · Pursuing profits also promotes the interests of society Stockholder Theory - answermanagers are agents of the stockholders, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices · Everyone who has stake in the company should be considered when making decisions · Customers, employees, stakeholders, executives, managers · Respect all rights of each stakeholders, and give equal considerations to the legitimate interests of all stakeholders and adapt corporate policies that produce the optimal balance among them Collection and Storage of Personal Data - answerData collected should only be what is necessary, should be explained all uses of it, and there should be options for how much is collected Secondary Data Use - answer1. privacy policies need to outline how else the company uses data; should adhere to any policies that are put in place; and should not stray from strictly "affiliate sharing" Data Accuracy - answerthe extent to which data are free of identifiable errors; data are correct (quality characteristic) Some cases like the Fair Credit Reporting Act (FCRA) allow data subjects to sue a credit bureau for damages if the bureau has been notified repeatedly about ©THEBRIGHT EXAM STUDY SOLUTIONS 8/27/2024 12:01 PM errors but has not taken steps to correct Authorized Access - answera) Need technical controls to allow restricted access to sensitive information b) Create politics on a "need to know" basis and consider physical blocking devices in clicks Automated Judgement - answera) Rise of expert systems (AI) in decision making b) ex. College students and credit cards by major Data Mining and Profiling - answerex. Combination of data between online ads and mail ads. Over generalization Opt-In - answerunless data subjects have given an expressed permission to use their data, it must be assumed that there is no consent for that use Opt-Out - answerunless data subjects register an overt objection, it is assumed that the additional use of the data is acceptable Computer Virus - answersoftware that is capable of executing an unwanted action on the victim's computer and has a mechanism for replicating itself inside other computers that come in contact with the infected machine Rootkit - answerComputer software that hides the presence and activity of intruders -Used in combo with trojan software, hackers can change system settings and use the computer without the user or monitoring software detecting it Worms - answerA more dangerous evolution of viruses, worms are self-propagating (meaning they do not need any intervention from the victim, such as clicking on infected software attached to an email) Trojan Horse - answer-It claims to do one thing or nothing harmful but instead does damage when you run it -Can be controlled remotely by hackers to extract passwords and other sensitive info -Can also be used to create zombie, for forwarding advertising spam, phishing emails and Trojan software to millions of other companies on the internet Phishing - answerSoftware that tricks internet users into divulging their personal info for use or resale by criminals who can profit from the info (Eg. fake emails and websites that look like real and from legitimate sourc

Meer zien Lees minder
Instelling
IDSC 3001
Vak
IDSC 3001

Voorbeeld van de inhoud

©THEBRIGHT EXAM STUDY SOLUTIONS 8/27/2024 12:01 PM



IDSC 3001 FINAL Exam Questions With
Correct Answers

Information Ethics - answer✔✔ethical issues associated with the development and application of
information technologies

Stakeholder Theory - answer✔✔A theory that holds that social responsibility is paying attention
to the interest of every affected stakeholder in every aspect of a firm's operation
· Anyone but the stockholder is a means to an end of profitability
· Executives can only spend funds in ways that have been approved by the stakeholders
· Through legal and ethical means, and with a long-term orientation
· Pursuing profits also promotes the interests of society

Stockholder Theory - answer✔✔managers are agents of the stockholders, and their only ethical
responsibility is to increase the profits of the business without violating the law or engaging in
fraudulent practices
· Everyone who has stake in the company should be considered when making decisions
· Customers, employees, stakeholders, executives, managers
· Respect all rights of each stakeholders, and give equal considerations to the legitimate interests
of all stakeholders and adapt corporate policies that produce the optimal balance among them

Collection and Storage of Personal Data - answer✔✔Data collected should only be what is
necessary, should be explained all uses of it, and there should be options for how much is
collected

Secondary Data Use - answer✔✔1. privacy policies need to outline how else the company uses
data; should adhere to any policies that are put in place; and should not stray from strictly
"affiliate sharing"

Data Accuracy - answer✔✔the extent to which data are free of identifiable errors; data are
correct (quality characteristic)
Some cases like the Fair Credit Reporting Act (FCRA) allow data subjects to sue
a credit bureau for damages if the bureau has been notified repeatedly about

, ©THEBRIGHT EXAM STUDY SOLUTIONS 8/27/2024 12:01 PM


errors but has not taken steps to correct

Authorized Access - answer✔✔a) Need technical controls to allow restricted access to sensitive
information
b) Create politics on a "need to know" basis and consider physical blocking
devices in clicks

Automated Judgement - answer✔✔a) Rise of expert systems (AI) in decision making
b) ex. College students and credit cards by major

Data Mining and Profiling - answer✔✔ex. Combination of data between online ads and mail ads.
Over generalization

Opt-In - answer✔✔unless data subjects have given an expressed permission to use their data, it
must be assumed that there is no consent for that use

Opt-Out - answer✔✔unless data subjects register an overt objection, it is assumed that the
additional use of the data is acceptable

Computer Virus - answer✔✔software that is capable of executing an unwanted action on the
victim's computer and has a mechanism for replicating itself inside other computers that come in
contact with the infected machine

Rootkit - answer✔✔Computer software that hides the presence and activity of intruders
-Used in combo with trojan software, hackers can change system settings and use the computer
without the user or monitoring software detecting it

Worms - answer✔✔A more dangerous evolution of viruses, worms are self-propagating
(meaning they do not need any intervention from the victim, such as clicking on infected
software attached to an email)

Trojan Horse - answer✔✔-It claims to do one thing or nothing harmful but instead does damage
when you run it
-Can be controlled remotely by hackers to extract passwords and other sensitive info
-Can also be used to create zombie, for forwarding advertising spam, phishing emails and Trojan
software to millions of other companies on the internet

Phishing - answer✔✔Software that tricks internet users into divulging their personal info for use
or resale by criminals who can profit from the info (Eg. fake emails and websites that look like
real and from legitimate sources)

, ©THEBRIGHT EXAM STUDY SOLUTIONS 8/27/2024 12:01 PM


Computer Intrusion/Hacking - answer✔✔Unauthorized access to a computer system, whether it
be a manual such as using a stolen password or automated through software to bypass network
security protection via the Internet

Denial-of-Service Attack - answer✔✔Inundating a computer, router or other networked device
with more packets of data than it can process, effectively blocking any legitimate requests to
access the system

Botnets - answer✔✔Networked groups of compromised computers or zombies that are
controlled by hackers, usually through Trojan software to deliver spam, phishing, and DoS
attacks

Man-in-the-Middle Attack - answer✔✔-Criminals create bogus sites that are capable of
communicating directly with legitimate sites in real time
-Victims access their actual accounts online or using hardware token, but do it through the man-
in-the-middle servers that capture all their information
-These servers can even force the legitimate site to keep secure sessions open after the victim has
logged off , allowing criminals to access the account and withdraw money

Social Engineering - answer✔✔In the context of information security, refers to psychological
manipulation of people into performing actions r divulging confidential information


-Kevin Mitnick

Null Routing - answer✔✔Aka Black Hole Route, is a network route or kernel routing table entry
that goes nowhere
-Matching packets are dropped (ignored) rather than forwarded

Firewalls - answer✔✔software to prevent unauthorized users

Data Encryption - answer✔✔the transformation of data into complex, scrambled digital codes
that can be de-crypted only by authorized users who possess unique decryption keys

Multi-factor Authentication - answer✔✔Security process in which the user provides two
different authentication factors to verify themselves to better protect both the user's credentials
and the resources the user can access (aka DUO)

Anti-phishing tips - answer✔✔

zero-day exploit - answer✔✔A vulnerability that is exploited before the software creator/vendor
is even aware of its existence.

Geschreven voor

Instelling
IDSC 3001
Vak
IDSC 3001

Documentinformatie

Geüpload op
28 augustus 2024
Aantal pagina's
17
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Thebright Florida State University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
199
Lid sinds
1 jaar
Aantal volgers
6
Documenten
13083
Laatst verkocht
1 dag geleden
Topscore Emporium.

On this page, you find verified, updated and accurate documents and package deals.

3.8

38 beoordelingen

5
15
4
10
3
8
2
1
1
4

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen