Which of the following is the correct description of a firewall?

Which of the following is the correct description of a firewall? Group of answer choices ​It is a concept used in developing security policies. It is hardware that prevents unauthorized data to enter the private network. It is a software that deletes viruses from attachments. It is a software and hardware combination that limits the incoming and outgoing Internet traffic. Flag this Question Question 672 pts Cyberloafing is a growing problem for organizations as employees spend increasing amounts of time texting, sending personal email, playing computer games, surfing the Web, shopping online, and checking for updates on Instagram and Facebook. Which of the following is an appropriate starting point for addressing cyberloafing in the workplace? Group of answer choices Ignoring the problem, because employees will find a way to loaf no matter what measures are implemented Blocking all access to the Internet when employees are at work to keep them on task Installing key loggers on all employee computers to monitor every keystroke for inappropriate behavior Developing an acceptable use policy that specifies what computer use behaviors are appropriate Flag this Question Question 682 pts Which legislation is designed to combat the growing crime of identity theft?​ Group of answer choices ​USA Patriot Act of 2001 ​USA Freedom Act of 2015 ​E-Government Act of 2002 ​Fair and Accurate Credit Transactions Act of 2003 Flag this Question Question 692 pts _____ states the principles and core values that are essential to a set of people and that, therefore, govern these people’s behavior. Group of answer choices Code of conduct Code of criminal procedure Code of ethics Code of civil procedure Flag this Question Question 702 pts Which of the following shortcoming may be revealed during an IT security audit? Group of answer choices whether the firewall is tall enough whether the IT budget is adequate or not whether the users are satisfied with IT services or not whether only a limited number of people have access to critical data or not Flag this Question Question 712 pts Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor’s office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated.​ Because the doctor’s practice violated its own privacy policy, she was able to file a lawsuit under the ________. Group of answer choices ​Gramm-Leach-Bliley Act ​Health Insurance Portability and Accountability Act ​Health and Medical Records Privacy Act USA Freedom Act Flag this Question Question 722 pts ​Which of the following security incidents is least costly to fix? Group of answer choices theft of program source code alteration of corporate database theft of trade secrets defacing of web pages Flag this Question Question 732 pts A botnet is a ________. Group of answer choices network of devices that are used for managing security network of robots that control an assembly line at a factory a group of computers controlled by hackers without the knowledge or consent of their owners network of servers that exchange traffic data Flag this Question Question 742 pts On the back of a credit card the three digit number above the signature panel is used to _________. Group of answer choices verify the identity of the credit card holder enter your account into a raffle verify the card is legitimate and not a stolen card number track your transactions for rewards program purposes Flag this Question Question 752 pts There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? Group of answer choices activate the forensics team and prepare documentation none of these answers meet with your lawyers to counter sue the customers settle with the customers, however it may cost Flag this Question Question 762 pts In 2010 a Spanish citizen lodged a complaint against a Spanish newspaper with the national Data Protection Agency and against Google Spain and Google Inc. The citizen complained that an auction notice of his repossessed home on Google’s search results infringed his privacy rights because the proceedings concerning him had been fully resolved for a number of years and hence the reference to these was entirely irrelevant. This resulted in a ruling by the Court of Justice of the European Union called the ____________________. Group of answer choices Right to be Forgotten Internet Memory Problem Euro-Privacy Edict Google Search Results Dilemma Flag this Question Question 772 pts Graydon noticed Jack, his friend and classmate, cheating on a physics exa and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school’s code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend​ and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? Group of answer choices ​developing a problem statement ​weighing options ​gathering information ​identifying options Flag this Question Question 782 pts More and more of our personal information exists in digital repositories and can potentially be used to assess our fit for a job or to tailor advertising to our preferences. Which of the following apps/services are offered as a way to engage online with some level of anonymity or impermenance? Group of answer choices AirBnB, Uber, Lyft Tipper, Gilt City, Livingsocial Facebook, Twitter, Pintrest Snapchat, Yik Yak, Tor Flag this Question Question 792 pts Behaviors can be structured within a legal/ethical framework where behaviors can be legal and ethical, illegal and unethical, legal but unethical, or illegal but ethical. Which of the following is a reason for why an increasing number of behaviors are falling into the categories of legal but unethical or illegal but ethical? Group of answer choices The make up of the Supreme Court is in flux as seats are vacated and not immediately filled so that it is difficult for anyone to say what is legal and what is illegal anymore. Tools that are designed for certain behaviors, like posting legitimate product reviews, can be used by consumers to engage in behaviors that were not intended by the tool designers, like posting funny reviews for the Hutlzer Banana Slicer. Ethical principles that were conceptualized long before the development of modern technologies cannot be applied to our current set of technologically-enabled behaviors. Technology changes occur faster than social, business, or political change, which means technology enables activity that may not be covered by traditional rules and norms that are the basis for laws and regulations. Flag this Question Question 802 pts In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT: Group of answer choices Access and Security Redress and Updates Policy and Choice Sharing and Selling

Answer

Ques: firewall: Ans:It is a software and hardware combination that limits the incoming and outgoing Internet traffic. A firewall is a security device, which can help to protect the network and your private data by filtering traffic and blocking unknowns from unauthorized access .Also, it helps to block malicious software from infecting the computer. Ans 672: The correct option is: Developing an acceptable use policy that specifies what computer use behaviors are appropriate.It has been seen that the introduction of technological interventions like blocking all access to the Internet when employees are at work to keep them on task or installing key loggers on all employee computers to monitor every keystroke for inappropriate behavior affects employees’ emotions and fairness perceptions. so the managers should fine-tune their cyberloafing policies so that there is a long-term remedy to the employees’ cyberloafing along with maintaining a level of required loyalty of employees. Ans 682:Fair and Accurate Credit Transactions Act of 2003 it is generally abbreviated as FACTA it is a federal law which was enactedv by US congress in 2003. Its main purpose is to protect consumers, particularly in relation to use of consumers’ information i.e. identity theft. E.g. alerts in case of frauds on credit cards. Ans 692: Code of ethics is the answer Code of ethics are the principles and values that guide people to behave in acertain manner and take right decisions. These are usually used in organisations and are known as ethical code of conduct. Ans 702:Correct option is -whether only a limited number of people have access to critical data or not

Audit is the formal examination whether the organisation is going correct with its operations or not. It can be specific to functions or processes of the organisation. It also examines that the critical information is not misused for any purposes and by anybody within or outside the organisation.

Leave a Comment