Which of the following is the correct description of a firewall?

Which of the following is the correct description of a firewall?

Group of answer choices

​It is a concept used in developing security policies.

It is hardware that prevents unauthorized data to enter the private network.

It is a software that deletes viruses from attachments.

It is a software and hardware combination that limits the incoming and outgoing Internet traffic.

Flag this Question

Question 672 pts

Cyberloafing is a growing problem for organizations as employees spend increasing amounts of time texting, sending personal email, playing computer games, surfing the Web, shopping online, and checking for updates on Instagram and Facebook. Which of the following is an appropriate starting point for addressing cyberloafing in the workplace?

Group of answer choices

Ignoring the problem, because employees will find a way to loaf no matter what measures are implemented

Blocking all access to the Internet when employees are at work to keep them on task

Installing key loggers on all employee computers to monitor every keystroke for inappropriate behavior

Developing an acceptable use policy that specifies what computer use behaviors are appropriate

Flag this Question

Question 682 pts

Which legislation is designed to combat the growing crime of identity theft?​

Group of answer choices

​USA Patriot Act of 2001

​USA Freedom Act of 2015

​E-Government Act of 2002

​Fair and Accurate Credit Transactions Act of 2003

Flag this Question

Question 692 pts

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Group of answer choices

Code of conduct

Code of criminal procedure

Code of ethics

Code of civil procedure

Flag this Question

Question 702 pts

Which of the following shortcoming may be revealed during an IT security audit?

Group of answer choices

whether the firewall is tall enough

whether the IT budget is adequate or not

whether the users are satisfied with IT services or not

whether only a limited number of people have access to critical data or not

Flag this Question

Question 712 pts

Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.​ Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the ________.

Group of answer choices

​Gramm-Leach-Bliley Act

​Health Insurance Portability and Accountability Act

​Health and Medical Records Privacy Act

USA Freedom Act

Flag this Question

Question 722 pts

​Which of the following security incidents is least costly to fix?

Group of answer choices

theft of program source code

alteration of corporate database

theft of trade secrets

defacing of web pages

Flag this Question

Question 732 pts

A botnet is a ________.

Group of answer choices

network of devices that are used for managing security

network of robots that control an assembly line at a factory

a group of computers controlled by hackers without the knowledge or consent of their owners

network of servers that exchange traffic data

Flag this Question

Question 742 pts

On the back of a credit card the three digit number above the signature panel is used to _________.

Group of answer choices

verify the identity of the credit card holder

enter your account into a raffle

verify the card is legitimate and not a stolen card number

track your transactions for rewards program purposes

Flag this Question

Question 752 pts

There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events?

Group of answer choices

activate the forensics team and prepare documentation

none of these answers

meet with your lawyers to counter sue the customers

settle with the customers, however it may cost

Flag this Question

Question 762 pts

In 2010 a Spanish citizen lodged a complaint against a Spanish newspaper with the national Data Protection Agency and against Google Spain and Google Inc. The citizen complained that an auction notice of his repossessed home on Google’s search results infringed his privacy rights because the proceedings concerning him had been fully resolved for a number of years and hence the reference to these was entirely irrelevant. This resulted in a ruling by the Court of Justice of the European Union called the ____________________.

Group of answer choices

Right to be Forgotten

Internet Memory Problem

Euro-Privacy Edict

Google Search Results Dilemma

Flag this Question

Question 772 pts

Graydon noticed Jack, his friend and classmate, cheating on a physics exa and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon?

Group of answer choices

​developing a problem statement

​weighing options

​gathering information

​identifying options

Flag this Question

Question 782 pts

More and more of our personal information exists in digital repositories and can potentially be used to assess our fit for a job or to tailor advertising to our preferences. Which of the following apps/services are offered as a way to engage online with some level of anonymity or impermenance?

Group of answer choices

AirBnB, Uber, Lyft

Tipper, Gilt City, Livingsocial

Facebook, Twitter, Pintrest

Snapchat, Yik Yak, Tor

Flag this Question

Question 792 pts

Behaviors can be structured within a legal/ethical framework where behaviors can be legal and ethical, illegal and unethical, legal but unethical, or illegal but ethical. Which of the following is a reason for why an increasing number of behaviors are falling into the categories of legal but unethical or illegal but ethical?

Group of answer choices

The make up of the Supreme Court is in flux as seats are vacated and not immediately filled so that it is difficult for anyone to say what is legal and what is illegal anymore.

Tools that are designed for certain behaviors, like posting legitimate product reviews, can be used by consumers to engage in behaviors that were not intended by the tool designers, like posting funny reviews for the Hutlzer Banana Slicer.

Ethical principles that were conceptualized long before the development of modern technologies cannot be applied to our current set of technologically-enabled behaviors.

Technology changes occur faster than social, business, or political change, which means technology enables activity that may not be covered by traditional rules and norms that are the basis for laws and regulations.

Flag this Question

Question 802 pts

In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT:

Group of answer choices

Access and Security

Redress and Updates

Policy and Choice

Sharing and Selling

Answer

Ques: firewall:

Ans:It is a software and hardware combination that limits the incoming and outgoing Internet traffic.

A firewall is a security device, which can help to protect the network and your private data by filtering traffic and blocking unknowns from unauthorized access .Also, it helps to block malicious software from infecting the computer.

Ans 672: The correct option is: Developing an acceptable use policy that specifies what computer use behaviors are appropriate.It has been seen that the introduction of technological interventions like blocking all access to the Internet when employees are at work to keep them on task or installing key loggers on all employee computers to monitor every keystroke for inappropriate behavior affects employees’ emotions and fairness perceptions. so the managers should fine-tune their cyberloafing policies so that there is a long-term remedy to the employees’ cyberloafing along with maintaining a level of required loyalty of employees.

Ans 682:Fair and Accurate Credit Transactions Act of 2003

it is generally abbreviated as FACTA it is a federal law which was enactedv by US congress in 2003. Its main purpose is to protect consumers, particularly in relation to use of consumers' information i.e. identity theft. E.g. alerts in case of frauds on credit cards.

Ans 692: Code of ethics is the answer

Code of ethics are the principles and values that guide people to behave in acertain manner and take right decisions. These are usually used in organisations and are known as ethical code of conduct.

Ans 702:Correct option is -whether only a limited number of people have access to critical data or not

Audit is the formal examination whether the organisation is going correct with its operations or not. It can be specific to functions or processes of the organisation. It also examines that the critical information is not misused for any purposes and by anybody within or outside the organisation.

Hottest videos

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts