100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Overig

INF1505 ASSIGNMENT 2 FOR 2024 - Distinction Obtained

Beoordeling
4,5
(2)
Verkocht
8
Pagina's
23
Geüpload op
29-05-2024
Geschreven in
2023/2024

Question 1 Not yet answered Marked out of 1.00 Flag question Question text Which of the following is recommended in the context of a comprehensive security plan? a. Participants should receive certificates before training sessions. b. Management should expect employees to implement their own training. c. Employees should be trained in security measures. d. Employee passwords and ID badges should be periodically revoked. Clear my choice Question 2 Not yet answered Marked out of 1.00 Flag question Question text Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____. a. unethical and illegal b. legal and ethical c. legal, but unethical d. ethical, but illegal Question 3 Not yet answered Marked out of 1.00 Flag question Question text The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology. True False Question 4 Not yet answered Marked out of 1.00 Flag question Question text Which of the following is not a key component of the General Data Protection Regulation (GDPR)? a. User consent must be given for processing of personal information. b. Safe data transfer across borders. c. Ease of use. d. Collected data must be anonymized to protect privacy. Question 5 Not yet answered Marked out of 1.00 Flag question Question text Which is included in the goal of the Health Insurance Portability and Accountability Act (HIPAA)? a. Safeguarding patients’ billing information b. Protecting patients’ computer records c. Safeguarding conversations between patients and their families d. Protecting patients’ credit information Clear my choice Question 6 Not yet answered Marked out of 1.00 Flag question Question text Virtual meetings are not considered cost effective applications of data communication systems for managers. True False Question 7 Not yet answered Marked out of 1.00 Flag question Question text In the two-tier architecture of the client/server model, _____. a. the application logic is always on the server b. the presentation logic is always on the client c. the data management logic is always on the client d. the application logic is always on the client Clear my choice Question 8 Not yet answered Marked out of 1.00 Flag question Question text _____ refers to using a cellular phone outside of a carrier’s limited service area. a. Roaming b. Teleprocessing c. Surfing d. Routing Question 9 Not yet answered Marked out of 1.00 Flag question Question text Job deskilling occurs when _________. a. fragmented jobs are combined as a whole. b. a job is carried out manually. c. a worker is promoted from a semiskilled to a skilled position. d. experienced labor is eliminated by high technology. Clear my choice Question 10 Not yet answered Marked out of 1.00 Flag question Question text A Answer ROOTKIT is a series of software tools that enable an unauthorized user to gain access to a computer or network system without being detected. Question 11 Not yet answered Marked out of 1.00 Flag question Question text Which statement is true of firewalls? a. They monitor network traffic and use the “prevent, detect, and react” approach to security. b. They cause routers to terminate connections with suspicious sources. c. They can identify attack signatures, trace patterns, and generate alarms for a network administrator. d. They protect against external access, but they leave networks unprotected from internal intrusions. Clear my choice Question 12 Not yet answered Marked out of 1.00 Flag question Question text _____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses. a. An identity log file b. Intellectual property c. A virtual organization d. Information policy Question 13 Not yet answered Marked out of 1.00 Flag question Question text WiMAX usually has a range of about _______ for fixed stations. a. 48 miles b. 28 miles c. 60 miles d. 8 miles Clear my choice Question 14 Not yet answered Marked out of 1.00 Flag question Question text Identify a true statement about information technology. a. It has eliminated more jobs than it has created. b. It has cut down production costs. c. It has increased clerical jobs. d. It has reduced consumers’ purchasing power. Question 15 Not yet answered Marked out of 1.00 Flag question Question text To minimize the invasion of privacy, users and organizations should: a. provide wrong data to unauthorized users. b. keep collected information even after the stated purpose is over. c. provide access to one’s personal information to all interested parties. d. use verification procedures to ensure data accuracy. Clear my choice Question 16 Not yet answered Marked out of 1.00 Flag question Question text In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that: a. the person using a credit card number is the card’s legitimate owner. b. a system can easily be restored to operational status. c. the accuracy of information resources within an organization is maintained. d. a system quickly recovers in the event of a system failure or disaster. Question 17 Not yet answered Marked out of 1.00 Flag question Question text _____ is one of the most popular password managers. a. CounterSpy b. STOPzilla c. Dashlane d. FilePro Clear my choice Question 18 Not yet answered Marked out of 1.00 Flag question Question text In which architecture is the application logic usually on the client side? a. two-tier b. middle-tier c. session tier d. data tier Question 19 Not yet answered Marked out of 1.00 Flag question Question text Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data. True False Question 20 Not yet answered Marked out of 1.00 Flag question Question text The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security. a. McCumber cube b. Bohr model c. Six Sigma model d. SWOT analysis Time left 0:20:43 Question 21 Not yet answered Marked out of 1.00 Flag question Question text Horizontal scaling of a client/server architecture means _____. a. adding more proxy servers b. migrating the network to a faster communication media c. migrating the network to decentralized servers d. adding more workstations Clear my choice Question 22 Not yet answered Marked out of 1.00 Flag question Question text Which statement is true of the different forms of sender and receiver devices? a. Smart terminals are full-featured computers. b. Thin clients have processing power. c. Netbook computers are high-cost computers with disks. d. Workstations serve as stand-alone systems. Time left 0:18:54 Question 23 Not yet answered Marked out of 1.00 Flag question Question text One aspect of intellectual property that has attracted attention recently is Answer CYBERSQUATTING , also known as domain squatting, which is registering, selling or using a domain name to profit from someone else's trademark. Question 24 Not yet answered Marked out of 1.00 Flag question Question text A/an _____ network is often used so that remote users have a secure connection to an organization’s network. a. biometric security b. terminal resource c. intrusion detection d. virtual private Question 25 Not yet answered Marked out of 1.00 Flag question Question text __________ are the top three countries for generating spam. a. Iceland, Chile, and India b. Nigeria, the Ukraine, and Mexico c. The United States, China, and Russia d. China, South Africa, and Germany Question 1 Not yet answered Marked out of 1.00 Flag question Question text Which of the following statements is true of a worm? a. It floods a network or server with service requests to prevent legitimate users’ access to the system. b. It is usually hidden inside a popular program, but it is not capable of replicating itself. c. It enables a system designer to bypass the security of a system and sneak back into the system later to access files. d. It is an independent program that can spread itself without attaching itself to a host program. Clear my choice Question 2 Not yet answered Marked out of 1.00 Flag question Question text Protocols are devices that connect users to the Internet. True False Question 3 Not yet answered Marked out of 1.00 Flag question Question text Which of the following is true of the 3G network? a. Requires a nearby Wi-Fi network b. Features a wider range of services than 2G c. Is unable to accommodate streaming video d. Has less advanced network capacity than 2G Clear my choice Question 4 Not yet answered Marked out of 1.00 Flag question Question text According to the Children’s Online Privacy Protection Act (COPPA), any information collected from children must have parental consent. True False Question 5 Not yet answered Marked out of 1.00 Flag question Question text According to the 1980 revisions to the Copyright Act of 1976, _____. a. copyright holders can perform a copyrighted work by means of digital audio transmission b. copyright protection extends to original works of authorship in architectural fields c. both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs d. the owner of a copyrighted program is allowed to make multiple copies or adaptations for use on other computers Clear my choice Question 6 Not yet answered Marked out of 1.00 Flag question Question text One of the first steps to consider when developing an organization's comprehensive security plan should be to set up a security committee with representatives from all departments as well as upper management. True False Question 7 Not yet answered Marked out of 1.00 Flag question Question text Which federal law is intended to protect data collected from children? a. COPPA b. GDPR c. FACTA d. HIPAA Clear my choice Question 8 Not yet answered Marked out of 1.00 Flag question Question text Application-filtering firewalls are less expensive than packet-filtering firewalls. True False Question 9 Not yet answered Marked out of 1.00 Flag question Question text _____ is the loss of power in a signal as it travels from the sending device to the receiving device. a. Throughput b. Bandwidth c. Attenuation d. Convergence Clear my choice Question 10 Not yet answered Marked out of 1.00 Flag question Question text The goal of the General Data Protection Regulation (GDPR) is to create more consistent protection of consumer and personal data across EU nations. True False Question 11 Not yet answered Marked out of 1.00 Flag question Question text To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a _____. a. user content policy b. article ownership policy c. standard data policy d. acceptable use policy Clear my choice Question 12 Not yet answered Marked out of 1.00 Flag question Question text Social engineering is an attack that takes advantage of the backdoors in security systems. True False Question 13 Not yet answered Marked out of 1.00 Flag question Question text A level 1 security system is used to protect _____ against unauthorized access. a. internal database servers b. users’ workstations c. back-end systems d. front-end servers Clear my choice Question 14 Not yet answered Marked out of 1.00 Flag question Question text In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need. True False Question 15 Not yet answered Marked out of 1.00 Flag question Question text Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model. a. transport layer b. network layer c. physical layer d. data Link layer Clear my choice Question 16 Not yet answered Marked out of 1.00 Flag question Question text In the context of data communication, which of the following media is based on “line of sight”? a. A coaxial cable b. A terrestrial microwave c. A fiber-optic cable d. A mechanical wave Question 17 Not yet answered Marked out of 1.00 Flag question Question text Which is a potential benefit of telecommuting? a. It regulates work routine. b. It increases the interaction with coworkers. c. It increases productivity. d. It separates work and home life. Clear my choice Question 18 Not yet answered Marked out of 1.00 Flag question Question text In the context of computer and network security, _____ refers to the accuracy of information resources within an organization. a. validity b. confidentiality c. availability d. integrity Question 19 Not yet answered Marked out of 1.00 Flag question Question text In a centralized processing system, processing power is distributed among several locations. True False Question 20 Not yet answered Marked out of 1.00 Flag question Question text Identify an advantage of centralized processing. a. It is highly responsive to users’ needs. b. It has the highest fault tolerance. c. It is highly compatible with organizational growth because workstations can be added easily. d. It helps in exercising tight control over system operations and applications. Time left 0:24:30 Question 21 Not yet answered Marked out of 1.00 Flag question Question text To minimize the invasion of privacy, users should be barred from reviewing their records. True False Question 22 Not yet answered Marked out of 1.00 Flag question Question text Answer MALWARE reduces the performance of the victim's computer. Question 23 Not yet answered Marked out of 1.00 Flag question Question text A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well. a. metropolitan area network b. controller area network c. local area network d. wide area network Clear my choice Question 24 Not yet answered Marked out of 1.00 Flag question Question text A patent protects product names and identifying marks. True False Question 25 Not yet answered Marked out of 1.00 Flag question Question text A Answer MODEM is a hardware device that allows several nodes to share one communication channel.

Meer zien Lees minder
Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
29 mei 2024
Aantal pagina's
23
Geschreven in
2023/2024
Type
Overig
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

INF1505
ASSIGNMENT 2 FOR 2024




FEND TUTORIALS

,Question 1
Not yet answered
Marked out of 1.00

Flag question

Question text
Which of the following is recommended in the context of a comprehensive security plan?


a.
Participants should receive certificates before training sessions.


b.
Management should expect employees to implement their own training.


c.
Employees should be trained in security measures.


d.
Employee passwords and ID badges should be periodically revoked.

Clear my choice

Question 2
Not yet answered
Marked out of 1.00

Flag question

Question text
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal
details to the banker who is responsible for sanctioning loans. The banker uses Clement’s personal
information to sell him insurance policies. In this scenario, the banker’s action is considered _____.




a.
unethical and illegal


b.


WhatsApp 0631738181

, legal and ethical


c.
legal, but unethical


d.
ethical, but illegal

Question 3
Not yet answered
Marked out of 1.00

Flag question

Question text
The bus topology connects nodes along a network segment, with the ends connected in a manner similar
to a ring topology.

True
False

Question 4
Not yet answered
Marked out of 1.00

Flag question

Question text
Which of the following is not a key component of the General Data Protection Regulation (GDPR)?


a.
User consent must be given for processing of personal information.


b.
Safe data transfer across borders.


c.
Ease of use.


d.
Collected data must be anonymized to protect privacy.

Question 5
Not yet answered
Marked out of 1.00

Flag question



WhatsApp 0631738181

Beoordelingen van geverifieerde kopers

Alle 2 reviews worden weergegeven
1 jaar geleden

1 jaar geleden

4,5

2 beoordelingen

5
1
4
1
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
FENDTUTORIALS
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2440
Lid sinds
4 jaar
Aantal volgers
1178
Documenten
520
Laatst verkocht
3 weken geleden

3,4

319 beoordelingen

5
118
4
44
3
71
2
23
1
63

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen