100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CDS 130 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
16-10-2025
Geschreven in
2025/2026

CDS 130 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE University policies & What are they used for? - Answers These policies govern the privacy, security, and confidentiality of university data, especially highly sensitive data, and the responsibilities of institutional units and individuals for such data. University policies & Who do these policies apply to? - Answers These policies apply to all academic and operational departments and offices at all George Mason University locations, owned and leased. The policies and procedures provided herein apply to all University faculty, staff, students, visitors and contractors. University policies & What are violations to these policies? - Answers The university forbids the disclosure of protected data in any medium except as approved in advance by a Data Owner. The use of any protected university data for one's own personal gain or profit, for the personal gain or profit of others, or to satisfy personal curiosity is strictly prohibited. University policies & If you violate these policies, what are some courses of actions that can be pursued by MASON? - Answers Any university employee, student or non-university individual with access to university data who engages in unauthorized use, disclosure, alteration, or destruction of data is in violation of this policy and will be subject to appropriate disciplinary action, including possible dismissal and/or legal action. University policies & What are the types of data/resources covered by these policies? - Answers Student Information: (Social Security number & date of birth) associated with a person Employee/Donor/Contractor/Affiliate Information: Driver's license associated with a personal identifier Background checks What are the roles and responsibilities of the various stakeholders involved in the policy? - Answers A data steward is a stakeholder role and they are.... Someone that establishes policies and direction for the overall security and privacy of all university data, particularly highly sensitive data within the respective areas of responsibility Why are stakeholder roles necessary? - Answers Hackers that want to use your data to steal your identification, phone number, date of birth and email address need to be guarded against What type of data do MASON protect? - Answers (PII) Personally identifiable data like birthday and Social security What approaches is MASON using to protect your data? - Answers Two factor authentication for faculty and staff Virtual private network access which requires you to provide a username and password What are some of the characteristics of a good password? - Answers Long passwords are better Pass-Phrases (sentence of known words) Use a different username & password for every account Use upper case + lower case + numbers What are examples of some common Password protection tools? - Answers Resetting the password every so often Using password generators Using password saving software CAS - central authentication services Shibboleth - works like CAS in requiring a username & password basis What is ethics? - Answers It is the set of well-established principles of right and wrong What are the different levels available to help guide ethical behavior? - Answers Principles Policies Regulations

Meer zien Lees minder
Instelling
CDS 130
Vak
CDS 130









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CDS 130
Vak
CDS 130

Documentinformatie

Geüpload op
16 oktober 2025
Aantal pagina's
6
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CDS 130 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE 2025-2026

University policies & What are they used for? - Answers These policies govern the privacy,
security, and confidentiality of university data, especially highly sensitive data, and the
responsibilities of institutional units and individuals for such data.

University policies & Who do these policies apply to? - Answers These policies apply to all
academic and operational departments and offices at all George Mason University locations,
owned and leased. The policies and procedures provided herein apply to all University faculty,
staff, students, visitors and contractors.

University policies & What are violations to these policies? - Answers The university forbids the
disclosure of protected data in any medium except as approved in advance by a Data Owner.
The use of any protected university data for one's own personal gain or profit, for the personal
gain or profit of others, or to satisfy personal curiosity is strictly prohibited.

University policies & If you violate these policies, what are some courses of actions that can be
pursued by MASON? - Answers Any university employee, student or non-university individual
with access to university data who engages in unauthorized use, disclosure, alteration, or
destruction of data is in violation of this policy and will be subject to appropriate disciplinary
action, including possible dismissal and/or legal action.

University policies & What are the types of data/resources covered by these policies? - Answers
Student Information:



(Social Security number & date of birth) associated with a person



Employee/Donor/Contractor/Affiliate Information:



Driver's license associated with a personal identifier Background checks

What are the roles and responsibilities of the various stakeholders involved in the policy? -
Answers A data steward is a stakeholder role and they are....

Someone that establishes policies and direction for the overall security and privacy of all
university data, particularly highly sensitive data within the respective areas of responsibility

Why are stakeholder roles necessary? - Answers Hackers that want to use your data to steal
your identification, phone number, date of birth and email address need to be guarded against

What type of data do MASON protect? - Answers (PII) Personally identifiable data like birthday

, and Social security

What approaches is MASON using to protect your data? - Answers Two factor authentication for
faculty and staff

Virtual private network access which requires you to provide a username and password

What are some of the characteristics of a good password? - Answers Long passwords are
better

Pass-Phrases (sentence of known words)

Use a different username & password for every account

Use upper case + lower case + numbers

What are examples of some common Password protection tools? - Answers Resetting the
password every so often

Using password generators

Using password saving software

CAS - central authentication services

Shibboleth - works like CAS in requiring a username & password basis

What is ethics? - Answers It is the set of well-established principles of right and wrong

What are the different levels available to help guide ethical behavior? - Answers Principles

Policies

Regulations

Laws

What is The honor code pledge? - Answers A pledge to not plagiarize, cheat, lie or steal
information

What is the Honor Code committee? - Answers Members of the committee serve on hearing
panels established to investigate and resolve alleged violations of the Honor Code.

Who are the members of the Honor Code committee? - Answers Honor Committee panels
consist of three Honor Committee members. In cases where a graduate student has been
referred, at least one member of the Honor Committee must be either a graduate student, an
administrative faculty member, a classified staff member, or a faculty member.

How are members of the Honor Code committee selected? - Answers Membership on the

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
37
Lid sinds
8 maanden
Aantal volgers
1
Documenten
11294
Laatst verkocht
3 dagen geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3,3

3 beoordelingen

5
1
4
0
3
1
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen