Question 13 (0.2 points) Question 13 Unsaved Marissa maintains an account on a s
ID: 371717 • Letter: Q
Question
Question 13 (0.2 points) Question 13 Unsaved Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating? Question 13 options: A) Maintain the security and confidentiality of your user ID and password. B) Take care of any property assigned to you. C) Use your knowledge of organizational information in a responsible way. D) Use the organization's supplies and services for official purposes only. Save Question 14 (0.2 points) Question 14 Unsaved Language that outlines acceptable and unacceptable use of IT resources and defines sanctions to be applied if a violation occurs is typically found in a/an __________. Question 14 options: A) employee code of conduct B) professional code of ethics C) security risk assessment D) user access agreement Save Question 15 (0.2 points) Question 15 Unsaved (Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use? Question 15 options: A) Yes B) No C) Maybe Save Question 16 (0.2 points) Question 16 Unsaved (True/False). Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses. Question 16 options: A) True B) False Save Question 17 (0.2 points) Question 17 Unsaved True or false? Online social networks are a totally safe environment in which to expand one's contacts and meet people from any part of the world. Question 17 options: A) True B) False Save Question 18 (0.2 points) Question 18 Unsaved In the scenario below, identify which of the three dimensions is primarily threatened or compromised. The constant popups on his computer are making it difficult for Alfonso to accomplish work that involves being on the internet. Question 18 options: A) Confidentiality B) Integrity C) Availability Save Question 19 (0.2 points) Question 19 Unsaved In the scenario below, identify which of the three dimensions is primarily threatened or compromised. A virus begins logging Alfonso's keystrokes and captures the user ID and password to his bank website. Question 19 options: A) Confidentiality B) Integrity C) Availability Save Question 20 (0.2 points) Question 20 Unsaved (True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database. Question 20 options: A) True B) False Save
Explanation / Answer
Question 13 Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?
C) Use your knowledge of organizational information in a responsible way.
Marissa is violating the conduct by using the knowledge of organizational information on a social networking site. She is responsible for the breach of trust that the Organization on her as its employee. Further, this act of hers may also result into adverse consequences such damaging the prestige of the Organization or offering a scope to the competitors to seek advantage of such information. Hence she should have been responsible enough to refrain committing such an act.
Question 14 Language that outlines acceptable and unacceptable use of IT resources and defines sanctions to be applied if a violation occurs is typically found in a/an __________.
D) user access agreement
It is one of the part of the employee’s code of conduct to ensure that the employees undertaking the IT resources for their activities are in knowledge of what could be ethical and legal consequences for violations.
Question 15 (Yes/No). Marie has a part time business selling jewelry. At her full time job as an accountant, she uses the company employee database to obtain addresses for employees that she knows well so she invite them to a party at her home designed to let them see and buy jewelry. Is this acceptable use?
B) No
Marie is using her Office property for the gain in her personal part-time business which is a violation of the code of conduct in an Organization. Also it is unethical in nature. Hence this is not acceptable.
Question 16 (True/False). Social networking through such services as Facebook, Twitter, LinkedIn, and YouTube have made significant changes to the way people gather and share information and experiences. Downloads from these services are safe from data theft and viruses
False
Safely assuming that these social networking sites may not be prone to data theft and viruses may rather be a folly. Viruses may be attacked in the computer when the users open some sponsored ads on these social networking sites which may have a potential threat of virus attack as it is just an external link to the main social networking site. Moreover, with advancement of technology, it shall be a game to play with the computer by not installing the anti-virus software and preventing it from the attacks because viruses could invade the computer in various forms that may have not be detected by these sites as yet. Moreover, data theft is a common feature. FB itself hacks and saves our navigation searches and feeds and sharing the same with various sponsored sites therefore exposing the given data to such threats.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.