Question

Which of the following statements would be most likely to appear in a professional association’s code...

Which of the following statements would be most likely to appear in a professional association’s code of ethics for its members?

  I will maintain the confidentiality of my username and password.

  I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.

  I will be use organizational supplies for official purposes only.

  I will use my network account only for the purpose specified in my job description.

Question 2

How is “risk” defined in the context of information technology and information security?

  A risk is a security breach of a computer system or unauthorized access to an online account, file, or other resource.

  A risk is a security breach of a computer system, an account, a file, or another online resource but would never be the result of an accidental action by a user.

  A risk is a potential compromise of a computer system, an account, a file, or another online resource and would most likely be perpetrated by a malicious attacker.

  A risk is a potential compromise of a computer system, an account, a file, or another online resource.

Question 3

Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?

  Reading the privacy policy of the social networking site

  Monitoring your privacy settings and adjusting as necessary

  Minimizing interaction with others on the social network

  Posting photos of friends

Question 4

Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?

  Your user ID and password

  Your social security number

  Your driver's license number

Question 5

The Digital Millennium Copyright Act governs behavior of internet service providers but does not affect individuals on the internet.

  True

  False

Question 6

Marissa maintains an account on a social networking site. She always performs updates on her own time, making sure to avoid visiting the site at work. Lately she has been upset by a new policy at her company and has made comments about it on her social networking page. Which of the following parts of a code of conduct is Marissa violating?

  Take care of any property assigned to you

  Use your knowledge of organizational information in a responsible way

  Use the organization’s supplies and services for official purposes only

  Maintain the security and confidentiality of your user ID and password

0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
Which of the following statements would be most likely to appear in a professional association’s code...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • Search this course mapter 07: What Would You Do? Self-Assessment Results Selecting Human Resources INSTRUCTIONS: Read...

    Search this course mapter 07: What Would You Do? Self-Assessment Results Selecting Human Resources INSTRUCTIONS: Read the question below, and select the best answer a. It may provide b. It may Information not jeopardize related to job the privacy potential or of job performance. candidates. o c. It might show Information that is not related to the job (e.g., age. race, gender, etc.). d. It takes too much time and effort for the value received. According to the Society for...

  • Paul Gray mentioned he was concerned about the security of his clients and their own management...

    Paul Gray mentioned he was concerned about the security of his clients and their own management of passwords and accounts. Improper password management can lead to cases of fraud and misuse of the system. One such type fraud is that victims' account passwords can be stolen and their share trading accounts can be misused for making unauthorized transactions that result in the victims making losses. This crime can be executed by the suspect installing key loggers in public computers, such...

  • Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee

    1. Which of the following matters would an auditor most likely consider to be a significant deficiency to be communicated to the audit committee? A. Management's failure to renegotiate unfavorable long-term purchase commitments.B. Recurring operating losses that may indicate going concern problems.C. Evidence of a lack of objectivity by those responsible for accounting decisions.D. Management's current plans to reduce its ownership equity in the entity. 2. After obtaining an understanding of internal control and arriving at a preliminary assessed level...

  • The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand...

    The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand online. It is headquartered in Manhattan, New York. Their on-line application that allows its customers to access video content is currently running on their data center and comprises of the following tiers: a Microsoft SQL Server Database, a Web Front-End on a Windows Server with IIS, and a File System-based content store for image and video files. In addition, the company uses internally...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Part III: Matching (45 points) Match the items below with their applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30. Cyber-extortion 31. Trojan horse 32. Scar...

    Part III: Matching (45 points) Match the items below with their applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30. Cyber-extortion 31. Trojan horse 32. Scareware 33. Social engineering 34. Vishing A man accessed millions of ChoicePoint files by claiming in writing and on the phone to be someone he was not. A. rs who opened the attachments unknowingly unleashed a program hidden inside another program that secretly copied the subscriber's account name and passwor forwarded them...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • #1. Which of the following is NOT one of the driving forces behind the dramatic increase...

    #1. Which of the following is NOT one of the driving forces behind the dramatic increase in the use of smartphones? a) growing use of social media b) lower prices of smartphones c) more apps and games d) longer battery life #2. Hardware consists of computer equipment that is used to perform all of the following activities EXCEPT: a) storage b) input c) analysis d) processing #3. Diego and Mary Ann are seeking _________, available for free, so they can...

  • I need a summary and your thought about this article How to Put Ethics in E-Business....

    I need a summary and your thought about this article How to Put Ethics in E-Business. Although the growth of e-commerce continues to provide businesses with more opportunities, the e-commerce industry faces many of the same ethical issues as traditional brick-and-mortar businesses. A key advantage of conducting e-business is that it gives small businesses access to a broader consumer market so they can compete with larger businesses. However, it’s up to the business owner to let customers know that a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT