100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C961 REVIEW EXAM QUESTIONS WITH COMPLETE SOLUTIONS GRADED A+

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
16-12-2024
Written in
2024/2025

C961 REVIEW EXAM QUESTIONS WITH COMPLETE SOLUTIONS GRADED A+ Which best practice standard should be enforced to ensure IT personnel are properly trained? - Answer-Reasonable professional standard The leader of an IT department is approached by one of her managers to ask for a salary increase. The manager does a fantastic job of presenting a solid rationale for the increase. At the end his presentation, he says he knows the salaries of all his colleagues because he accessed the payroll file on the company network. Which part of the security triad was violated? - Answer-Confidentiality The leader of an IT department is approached by one of her managers to ask for a salary increase. The manager does a fantastic job of presenting a solid rationale for the increase. At the end his presentation, he says he knows the salaries of all his colleagues because he accessed the payroll file on the company network. Which method may have mitigated the threat posed by the manager? - Answer-Proper access control The leader of an IT department is approached by one of her managers to ask for a salary increase. The manager does a fantastic job of presenting a solid rationale for the increase. At the end his presentation, he says he knows the salaries of all his colleagues because he accessed the payroll file on the company network. Which law may this leader's organization use against this manager? - Answer-Computer Fraud and Abuse Act An avid software developer opens a software business and registers the company using SIC 7371 and NAICS 541511 codes. This business is contracted to create a resource management system to automate processes. The company modified an open source code and marketed it as proprietary software, charging other companies thousands of dollars to use it. What may this open source community obtain to avoid this practice? - Answer-Open source license

Show more Read less
Institution
C961
Course
C961









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C961
Course
C961

Document information

Uploaded on
December 16, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • c961

Content preview

C961 REVIEW EXAM QUESTIONS
WITH COMPLETE SOLUTIONS
GRADED A+
Which best practice standard should be enforced to ensure IT personnel are properly
trained? - Answer-Reasonable professional standard

The leader of an IT department is approached by one of her managers to ask for a
salary increase. The manager does a fantastic job of presenting a solid rationale for the
increase. At the end his presentation, he says he knows the salaries of all his
colleagues because he accessed the payroll file on the company network.

Which part of the security triad was violated? - Answer-Confidentiality

The leader of an IT department is approached by one of her managers to ask for a
salary increase. The manager does a fantastic job of presenting a solid rationale for the
increase. At the end his presentation, he says he knows the salaries of all his
colleagues because he accessed the payroll file on the company network.

Which method may have mitigated the threat posed by the manager? - Answer-Proper
access control

The leader of an IT department is approached by one of her managers to ask for a
salary increase. The manager does a fantastic job of presenting a solid rationale for the
increase. At the end his presentation, he says he knows the salaries of all his
colleagues because he accessed the payroll file on the company network.

Which law may this leader's organization use against this manager? - Answer-Computer
Fraud and Abuse Act

An avid software developer opens a software business and registers the company using
SIC 7371 and NAICS 541511 codes.

This business is contracted to create a resource management system to automate
processes. The company modified an open source code and marketed it as proprietary
software, charging other companies thousands of dollars to use it.

What may this open source community obtain to avoid this practice? - Answer-Open
source license

, An avid software developer opens a software business and registers the company using
SIC 7371 and NAICS 541511 codes.

A software developer's code defines the business. An employee created a product to
corrupt data every couple of weeks. During the testing phase, the code worked as
planned, and the company and the end user accepted it. After one week, the end user's
data were corrupted.

How may this threat be described? - Answer-Malware

An avid software developer opens a software business and registers the company using
SIC 7371 and NAICS 541511 codes.

The product the firm produces dictates its viability, but the software has a reputation of
being defective. To ensure the success of the firm, several developers were terminated
for producing malicious software.

What may these terminated employees be classified as? - Answer-Black hat hackers

An avid software developer opens a software business and registers the company using
SIC 7371 and NAICS 541511 codes.

Which type of ethics is absent when workers purposely defame their employer by
demonstrating unethical behaviors without considering the impact on information
systems? - Answer-Virtue ethics

As part of a college's requirement for degree completion, a student is required to work in
a team of three to create a business plan for a company of her choice. She has two
good friends who started the program with her, and all have agreed to work together.
After several brainstorming meetings, everyone agrees that the company would be a
startup. The main focus of this business would be providing services for nonprofessional
caregivers. The company defines nonprofessional caretakers as family members taking
care of relatives in a private home environment.

Which organization would offer more comprehensive training programs to support
caregivers? - Answer-Centers for Medicare & Medicaid Services (CMS)

As part of a college's requirement for degree completion, a student is required to work in
a team of three to create a business plan for a company of her choice. She has two
good friends who started the program with her, and all have agreed to work together.
After several brainstorming meetings, everyone agrees that the company would be a
startup. The main focus of this business would be providing services for nonprofessional
caregivers. The company defines nonprofessional caretakers as family members taking
care of relatives in a private home environment.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
wisdompoint chamberlain college of nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
115
Member since
2 year
Number of followers
66
Documents
5602
Last sold
4 days ago
Nursing Tec

3.7

16 reviews

5
6
4
3
3
5
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions