100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ETHICS Straighterline IT101 Information Technology Fundamentals Graded Topic Test (New Version August 2024)

Puntuación
-
Vendido
-
Páginas
9
Grado
A+
Subido en
21-08-2024
Escrito en
2024/2025

ETHICS Straighterline IT101 Information Technology Fundamentals Graded Topic Test (New Version August 2024) We are a team of experts offering course/class attendance (including final proctored exams!!) for all Straighterline, Online ATI, HESI, NCLEX, Portage Learning, Sophia, Nursing, Business etc courses. We also write essays, discussion posts, research papers and school assignments. Should you need any of these services, Contact us via email: or : +1 (540) 753-5914. Guaranteed Passing! Step 1 of 1 Question 1 of 16 "Fill in the blank" question: select the correct answer. - Question 1 The input and select elements may be inline with important contextual information. This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. privacy privacy can be defined as the state of being free from intrusion or disturbance in one’s personal life or affairs. Response for: undefined Correct. Question 2 of 16 Question 2 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. During his regular maintenance and troubleshooting activities, an IT administrator comes into possession of classified company information about new business plans. Which of the following would not be considered an unethical action for him to take based on this information?offer a competitor the information in return for a large sum of money or a lucrative position in the company casually discuss the business plans with friends and colleagues in an informal setting delete the classified information from the source where he found it so that nobody else finds it who is not supposed to all of the above are considered unethical actions Correct. Question 3 of 16 Question 3 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Douglas manages a large number of employees at his company. A sales representative for a local automobile dealer contacts him and explains that a certain individual listed Douglas as his supervisor in a credit application for a car. He asks if Douglas could confirm this fact. What should Douglas do? he should affirm that the individual is his employee he should confirm that he is the employee’s supervisor and provide additional information such as salary in an effort to help the employee get the credit she needs he should not disclose this information in order to protect the privacy of the employee he should immediately report the incident to the proper authorities as an instance of the violation of privacy Correct. Question 4 of 16 Question 4 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully.A company is struggling financially and has decided that they must lay off a few employees. As part of a severance package they are offering them, the employees are being allowed to keep the company laptops that they had used while working there. What security issue might be posed by this decision? the laptops might have information that belongs to the company and should not be spread publicly the laptops could be construed as taxable income that the employees would not think to report the laptops are configured for the company’s network access, and there would be no way to prevent the former employees from continuing to log on even after they were laid off there might be a confidentiality or integrity issue involved in this situation, but no security issue Correct. Question 5 of 16 Question 5 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. A project plan that an organization will keep secret is which of the following types of information? sensitive information private information personal information confidential information Correct. Question 6 of 16Question 6 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following correctly describes the concern of data availability? while it is very easy to process data and create data, technology struggles to make data readily available in the way that would be desired it is important that security restrictions do not prevent authorized parties from accessing needed information while data should be available to all onsite users, remote access to data should be strictly guarded against there is a security risk if data is too easily available Correct. Question 7 of 16 Question 7 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Jasmine was working on a financial report for her supervisor using recent records in the company database. While she was working with those records, another employee opened the same records and made a few updates based on more recent official company calculations. Jasmine’s report did not include those updates, but she did make a few minor corrections (such as spelling corrections) to the file that she noticed before saving it. What security issue is in play in this scenario? two employees altering data at the same time could lead to data corruption Jasmine should not be able to make such unofficial alterations to the data the company should not try to update old records, but instead should simply create new records and save both files separatelythere is no security issue here so long as Jasmine does not try to track her changes Correct. Question 8 of 16 Question 8 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Paula was on a business trip in another region of the country and tried to log on remotely from her laptop to the company network back home. When she did so, however, she received a message informing her that her device was not recognized. When she communicated with the IT department, she was told that a new policy had been implemented and that all laptops and mobile devices had to be physically inspected by IT before being granted network access. What is the data security problem in this scenario? confidentiality integrity there is no security problem in this scenario; security is being adequately addressed availability Correct. Question 9 of 16 Question 9 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What is stipulated by the Drivers Privacy Protection Act of 1994? states are prohibited from selling data gathered in the process of registering drivers with drivers’ licenses drivers are not required to show personal identification to law enforcement officers unless they are being given an actual citationdrivers do not have to give personal information to the government in order to register for a driver’s license if they do not wish to all of the above Correct. Question 10 of 16 Question 10 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Many acts of legislation have been updated in recent decades to account for changes in technology. As technology had advanced so rapidly, legislation had at times not yet taken into account this advance, leading to acts that are now clearly illegal not being classified as such for a time. Which of the following is a reasonable observation based upon this fact? not everything that is legal according to the letter of the law should be considered ethically acceptable IT professionals, as well as users, ought to be informed about the law, but not use it as their exclusive guide there very possibly are IT activities that are not illegal today that will be classified as such in the future all of the above Correct. Question 11 of 16 Question 11 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which approach to IT policies and ethics is the single right one for an organization to take?all laws and ethical norms must be observed to the letter of the law, but as much freedom as possible should be given to the user after that so long as no harm comes to any user and the general letter of the law is observed, the complex details of the law do not need to be closely observed not only will all laws and regulations be observed as well as ethical considerations, but additional restrictions and safeguards will be added to provide even greater protection and security to the user none of the above is the single right approach Correct. Question 12 of 16 Question 12 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a common area of IT ethics that company policies should address? security and privacy of data role of IT in the company whether social security numbers of employees will be openly publicized how the company handles copyright protection issues Correct. Question 13 of 16 Question 13 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following may a company adopt as their IT ethical policy?all data sent over the network will be encrypted users should not share private personal information in business emails IT administrators will not open private files of users without necessary cause all of the above Correct. Question 14 of 16 Question 14 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following organizations does not provide a professional association code of ethics? ISACA AITP ACM all of these provide suggested codes of ethics Correct. Question 15 of 16 Question 15 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. According to professional codes of ethics, whose trust do IT professionals hold first and foremost? For this reason, the professional is responsible to protect this party’s interests. his employerthe public the professional association to which he belongs none of the above Correct. Question 16 of 16 Question 16 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. According to ISACA, IT professionals should only undertake what kind of projects? those they are competent to perform those that provide no risk of failure those that match their enthusiasm and areas of greatest interest those they are well remunerated for

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
21 de agosto de 2024
Número de páginas
9
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ETHICS
Straighterline IT101 Information Technology Fundamentals Graded Topic Test
(New Version August 2024)
We are a team of experts offering course/class attendance (including final proctored exams!!) for all
Straighterline, Online ATI, HESI, NCLEX, Portage Learning, Sophia, Nursing, Business etc courses.
We also write essays, discussion posts, research papers and school assignments. Should you need any
of these services, Contact us via email: or WhatsApp: +1 (540) 753-5914.
Guaranteed Passing!




Step 1 of 1
Question 1 of 16
"Fill in the blank" question: select the correct
answer. - Question 1
The input and select elements may be inline with important contextual information.

This is not a form; we suggest that you use the browse mode and read all parts of

the question carefully.

privacy


privacy
can be defined as the state of being free from intrusion or disturbance in one’s
personal life or affairs.
Response for: undefined

Correct.
Question 2 of 16
Question 2
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
During his regular maintenance and troubleshooting activities, an IT administrator
comes into possession of classified company information about new business plans.
Which of the following would not be considered an unethical action for him to take
based on this information?

, offer a competitor the information in return for a large sum of money or a lucrative
position in the company

casually discuss the business plans with friends and colleagues in an informal setting

delete the classified information from the source where he found it so that nobody else
finds it who is not supposed to

all of the above are considered unethical actions
Correct.
Question 3 of 16
Question 3
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Douglas manages a large number of employees at his company. A sales representative
for a local automobile dealer contacts him and explains that a certain individual listed
Douglas as his supervisor in a credit application for a car. He asks if Douglas could
confirm this fact. What should Douglas do?

he should affirm that the individual is his employee

he should confirm that he is the employee’s supervisor and provide additional
information such as salary in an effort to help the employee get the credit she needs

he should not disclose this information in order to protect the privacy of the employee

he should immediately report the incident to the proper authorities as an instance of
the violation of privacy
Correct.
Question 4 of 16
Question 4
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
AmazingGrace Western Governer\'s University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1655
Miembro desde
3 año
Número de seguidores
1193
Documentos
9304
Última venta
5 horas hace

4.1

381 reseñas

5
224
4
57
3
49
2
13
1
38

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes