100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

INF1505 ASSIGNMENT 2 FOR 2024 - Distinction Obtained

Rating
4,5
(2)
Sold
8
Pages
23
Uploaded on
29-05-2024
Written in
2023/2024

Question 1 Not yet answered Marked out of 1.00 Flag question Question text Which of the following is recommended in the context of a comprehensive security plan? a. Participants should receive certificates before training sessions. b. Management should expect employees to implement their own training. c. Employees should be trained in security measures. d. Employee passwords and ID badges should be periodically revoked. Clear my choice Question 2 Not yet answered Marked out of 1.00 Flag question Question text Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____. a. unethical and illegal b. legal and ethical c. legal, but unethical d. ethical, but illegal Question 3 Not yet answered Marked out of 1.00 Flag question Question text The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology. True False Question 4 Not yet answered Marked out of 1.00 Flag question Question text Which of the following is not a key component of the General Data Protection Regulation (GDPR)? a. User consent must be given for processing of personal information. b. Safe data transfer across borders. c. Ease of use. d. Collected data must be anonymized to protect privacy. Question 5 Not yet answered Marked out of 1.00 Flag question Question text Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)? a. Safeguarding patients’ billing information b. Protecting patients’ computer records c. Safeguarding conversations between patients and their families d. Protecting patients’ credit information Clear my choice Question 6 Not yet answered Marked out of 1.00 Flag question Question text Virtual meetings are not considered cost effective applications of data communication systems for managers. True False Question 7 Not yet answered Marked out of 1.00 Flag question Question text In the two-tier architecture of the client/server model, _____. a. the application logic is always on the server b. the presentation logic is always on the client c. the data management logic is always on the client d. the application logic is always on the client Clear my choice Question 8 Not yet answered Marked out of 1.00 Flag question Question text _____ refers to using a cellular phone outside of a carrier’s limited service area. a. Roaming b. Teleprocessing c. Surfing d. Routing Question 9 Not yet answered Marked out of 1.00 Flag question Question text Job deskilling occurs when _________. a. fragmented jobs are combined as a whole. b. a job is carried out manually. c. a worker is promoted from a semiskilled to a skilled position. d. experienced labor is eliminated by high technology. Clear my choice Question 10 Not yet answered Marked out of 1.00 Flag question Question text A Answer ROOTKIT is a series of software tools that enable an unauthorized user to gain access to a computer or network system without being detected. Question 11 Not yet answered Marked out of 1.00 Flag question Question text Which statement is true of firewalls? a. They monitor network traffic and use the “prevent, detect, and react” approach to security. b. They cause routers to terminate connections with suspicious sources. c. They can identify attack signatures, trace patterns, and generate alarms for a network administrator. d. They protect against external access, but they leave networks unprotected from internal intrusions. Clear my choice Question 12 Not yet answered Marked out of 1.00 Flag question Question text _____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses. a. An identity log file b. Intellectual property c. A virtual organization d. Information policy Question 13 Not yet answered Marked out of 1.00 Flag question Question text WiMAX usually has a range of about _______ for fixed stations. a. 48 miles b. 28 miles c. 60 miles d. 8 miles Clear my choice Question 14 Not yet answered Marked out of 1.00 Flag question Question text Identify a true statement about information technology. a. It has eliminated more jobs than it has created. b. It has cut down production costs. c. It has increased clerical jobs. d. It has reduced consumers’ purchasing power. Question 15 Not yet answered Marked out of 1.00 Flag question Question text To minimize the invasion of privacy, users and organizations should: a. provide wrong data to unauthorized users. b. keep collected information even after the stated purpose is over. c. provide access to one’s personal information to all interested parties. d. use verification procedures to ensure data accuracy. Clear my choice Question 16 Not yet answered Marked out of 1.00 Flag question Question text In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that: a. the person using a credit card number is the card’s legitimate owner. b. a system can easily be restored to operational status. c. the accuracy of information resources within an organization is maintained. d. a system quickly recovers in the event of a system failure or disaster. Question 17 Not yet answered Marked out of 1.00 Flag question Question text _____ is one of the most popular password managers. a. CounterSpy b. STOPzilla c. Dashlane d. FilePro Clear my choice Question 18 Not yet answered Marked out of 1.00 Flag question Question text In which architecture is the application logic usually on the client side? a. two-tier b. middle-tier c. session tier d. data tier Question 19 Not yet answered Marked out of 1.00 Flag question Question text Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data. True False Question 20 Not yet answered Marked out of 1.00 Flag question Question text The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security. a. McCumber cube b. Bohr model c. Six Sigma model d. SWOT analysis Time left 0:20:43 Question 21 Not yet answered Marked out of 1.00 Flag question Question text Horizontal scaling of a client/server architecture means _____. a. adding more proxy servers b. migrating the network to a faster communication media c. migrating the network to decentralized servers d. adding more workstations Clear my choice Question 22 Not yet answered Marked out of 1.00 Flag question Question text Which statement is true of the different forms of sender and receiver devices? a. Smart terminals are full-featured computers. b. Thin clients have processing power. c. Netbook computers are high-cost computers with disks. d. Workstations serve as stand-alone systems. Time left 0:18:54 Question 23 Not yet answered Marked out of 1.00 Flag question Question text One aspect of intellectual property that has attracted attention recently is Answer CYBERSQUATTING , also known as domain squatting, which is registering, selling or using a domain name to profit from someone else's trademark. Question 24 Not yet answered Marked out of 1.00 Flag question Question text A/an _____ network is often used so that remote users have a secure connection to an organization’s network. a. biometric security b. terminal resource c. intrusion detection d. virtual private Question 25 Not yet answered Marked out of 1.00 Flag question Question text __________ are the top three countries for generating spam. a. Iceland, Chile, and India b. Nigeria, the Ukraine, and Mexico c. The United States, China, and Russia d. China, South Africa, and Germany Question 1 Not yet answered Marked out of 1.00 Flag question Question text Which of the following statements is true of a worm? a. It floods a network or server with service requests to prevent legitimate users’ access to the system. b. It is usually hidden inside a popular program, but it is not capable of replicating itself. c. It enables a system designer to bypass the security of a system and sneak back into the system later to access files. d. It is an independent program that can spread itself without attaching itself to a host program. Clear my choice Question 2 Not yet answered Marked out of 1.00 Flag question Question text Protocols are devices that connect users to the Internet. True False Question 3 Not yet answered Marked out of 1.00 Flag question Question text Which of the following is true of the 3G network? a. Requires a nearby Wi-Fi network b. Features a wider range of services than 2G c. Is unable to accommodate streaming video d. Has less advanced network capacity than 2G Clear my choice Question 4 Not yet answered Marked out of 1.00 Flag question Question text According to the Children’s Online Privacy Protection Act (COPPA), any information collected from children must have parental consent. True False Question 5 Not yet answered Marked out of 1.00 Flag question Question text According to the 1980 revisions to the Copyright Act of 1976, _____. a. copyright holders can perform a copyrighted work by means of digital audio transmission b. copyright protection extends to original works of authorship in architectural fields c. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs d. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers Clear my choice Question 6 Not yet answered Marked out of 1.00 Flag question Question text One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management. True False Question 7 Not yet answered Marked out of 1.00 Flag question Question text Which federal law is intended to protect data collected from children? a. COPPA b. GDPR c. FACTA d. HIPAA Clear my choice Question 8 Not yet answered Marked out of 1.00 Flag question Question text Application-filtering firewalls are less expensive than packet-filtering firewalls. True False Question 9 Not yet answered Marked out of 1.00 Flag question Question text _____ is the loss of power in a signal as it travels from the sending device to the receiving device. a. Throughput b. Bandwidth c. Attenuation d. Convergence Clear my choice Question 10 Not yet answered Marked out of 1.00 Flag question Question text The goal of the General Data Protection Regulation (GDPR) is to create more consistent protection of consumer and personal data across EU nations. True False Question 11 Not yet answered Marked out of 1.00 Flag question Question text To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a _____. a. user content policy b. article ownership policy c. standard data policy d. acceptable use policy Clear my choice Question 12 Not yet answered Marked out of 1.00 Flag question Question text Social engineering is an attack that takes advantage of the backdoors in security systems. True False Question 13 Not yet answered Marked out of 1.00 Flag question Question text A level 1 security system is used to protect _____ against unauthorized access. a. internal database servers b. users’ workstations c. back-end systems d. front-end servers Clear my choice Question 14 Not yet answered Marked out of 1.00 Flag question Question text In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need. True False Question 15 Not yet answered Marked out of 1.00 Flag question Question text Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model. a. transport layer b. network layer c. physical layer d. data Link layer Clear my choice Question 16 Not yet answered Marked out of 1.00 Flag question Question text In the context of data communication, which of the following media is based on “line of sight”? a. A coaxial cable b. A terrestrial microwave c. A fiber-optic cable d. A mechanical wave Question 17 Not yet answered Marked out of 1.00 Flag question Question text Which is a potential benefit of telecommuting? a. It regulates work routine. b. It increases the interaction with coworkers. c. It increases productivity. d. It separates work and home life. Clear my choice Question 18 Not yet answered Marked out of 1.00 Flag question Question text In the context of computer and network security, _____ refers to the accuracy of information resources within an organization. a. validity b. confidentiality c. availability d. integrity Question 19 Not yet answered Marked out of 1.00 Flag question Question text In a centralized processing system, processing power is distributed among several locations. True False Question 20 Not yet answered Marked out of 1.00 Flag question Question text Identify an advantage of centralized processing. a. It is highly responsive to users’ needs. b. It has the highest fault tolerance. c. It is highly compatible with organizational growth because workstations can be added easily. d. It helps in exercising tight control over system operations and applications. Time left 0:24:30 Question 21 Not yet answered Marked out of 1.00 Flag question Question text To minimize the invasion of privacy, users should be barred from reviewing their records. True False Question 22 Not yet answered Marked out of 1.00 Flag question Question text Answer MALWARE reduces the performance of the victim's computer. Question 23 Not yet answered Marked out of 1.00 Flag question Question text A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well. a. metropolitan area network b. controller area network c. local area network d. wide area network Clear my choice Question 24 Not yet answered Marked out of 1.00 Flag question Question text A patent protects product names and identifying marks. True False Question 25 Not yet answered Marked out of 1.00 Flag question Question text A Answer MODEM is a hardware device that allows several nodes to share one communication channel.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 29, 2024
Number of pages
23
Written in
2023/2024
Type
Other
Person
Unknown

Subjects

Content preview

INF1505
ASSIGNMENT 2 FOR 2024




FEND TUTORIALS

,Question 1
Not yet answered
Marked out of 1.00

Flag question

Question text
Which of the following is recommended in the context of a comprehensive security plan?


a.
Participants should receive certificates before training sessions.


b.
Management should expect employees to implement their own training.


c.
Employees should be trained in security measures.


d.
Employee passwords and ID badges should be periodically revoked.

Clear my choice

Question 2
Not yet answered
Marked out of 1.00

Flag question

Question text
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal
details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal
information to sell him insurance policies. In this scenario, the banker’s action is considered _____.




a.
unethical and illegal


b.


WhatsApp 0631738181

, legal and ethical


c.
legal, but unethical


d.
ethical, but illegal

Question 3
Not yet answered
Marked out of 1.00

Flag question

Question text
The bus topology connects nodes along a network segment, with the ends connected in a manner similar
to a ring topology.

True
False

Question 4
Not yet answered
Marked out of 1.00

Flag question

Question text
Which of the following is not a key component of the General Data Protection Regulation (GDPR)?


a.
User consent must be given for processing of personal information.


b.
Safe data transfer across borders.


c.
Ease of use.


d.
Collected data must be anonymized to protect privacy.

Question 5
Not yet answered
Marked out of 1.00

Flag question



WhatsApp 0631738181

Reviews from verified buyers

Showing all 2 reviews
1 year ago

1 year ago

4,5

2 reviews

5
1
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
FENDTUTORIALS
View profile
Follow You need to be logged in order to follow users or courses
Sold
2440
Member since
4 year
Number of followers
1178
Documents
520
Last sold
3 weeks ago

3,4

319 reviews

5
118
4
44
3
71
2
23
1
63

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions