CIS3345:
Management Information Systems

Spring, 2015

Chapter 13 On-Line Quiz B

Complete the form below ONLY if your Pseudonym begins with  the Alphabetic Characters "D" through "M" (uppercase or lower Case)

If you choose this Quiz and you do not meet the criteria above, you will receive a zero (0)

Enter Your PSEUDONYM:                

Question 1:    As a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:

                       
 Properly performing your role as a vital human resource in the business systems you help develop and use in your organization.
                          Properly using the Internet for personal use only during breaks and after-work hours.
                          Properly performing your role as a vital business resource by participating on every development team
                          Properly documenting all employee electronic mail usage and Internet searches.
 

Question 2:    In business ethics, the stakeholder theory maintains that:

                         Companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract.
                          Managers are agents of the stockholders, and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices.
                          Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders, which are all individuals and groups that have a stake in or claim on a company.
                          Managers are agents of the customer, and their only ethical responsibility is to increase the service of the business without violating the law or engaging in fraudulent practices.
 

Question 3:    There are four major principles of technology ethics: proportionality, informed consent, justice, and minimized risk. Which of the following best describes proportionality?

                       
 What is best for a given individual is right.
                          The good achieved by the technology must outweigh the harm or risk
                          Those affected by technology should understand and accept the risk.
                          Technology must be implemented so as to avoid all unnecessary risk.
 

Question 4:    The Association of Information Technology Professionals (AITP) created standards of professional conduct that can serve as a model for ethical conduct by business end users as well as by information system professionals. Which of the following is NOT one of those standards?

                       
 In recognition of my obligation to my employer, I shall avoid conflicts of interest and ensure that my employer is aware of any potential conflicts.
                          In recognition of my obligation to my employer, I shall protect the privacy and confidentiality of all information entrusted to me.
                          In recognition of my obligation to my employer, I shall withhold information that is germane to the situation if it is possible for me or my direct supervisor to obtain personal gain.
                          In recognition of my obligation to my employer, I shall not exploit weaknesses of a computer system for personal gain or personal satisfaction.
 

Question 5:    Which one of the following statements is NOT included in the definition of The Association of Information Technology Professionals (ATIP) computer crime as:

                       
 Unauthorized modification of software, data, or network resources.
                          Unauthorized distribution of freeware software.
                          Unauthorized copying of software
                          Unauthorized release of information.
 

Question 6:    Which of the following is a method to defend against denial of service attacks?

                       
 Set and enforce security policies.
                          Monitor employee emails.
                          Coordinate security with other companies.
                          Monitor unused ports.
 

Question 7:    What is Dumpster Diving?

                       
 An instruction in a computer program that triggers a malicious act
                          Software that can guess passwords
                          A program that contains instructions that exploit a known vulnerability in some software
                          Sifting through a company’s garbage to find information to help break into their computers
 

Question 8:    Hacking, in computerese, is the obsessive use of computers, or the unauthorized access and use of networked computer systems. There are many common hacking tactics to assault companies through the Internet and other networks. War dialing is one such tactic. War dialing is described as:"


                       
 A program that automatically dials thousands of telephone numbers in search of a way in through a modem connection.
                          A tiny program that misuse your computer's resources, modify files on the hard disk, send fake e-mail, or steal passwords.
                          A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software.
                          Having a few hidden ways back so that re-entry to a computer system is easy and difficult to detect.
 

Question 9:    Which of the following is NOT an Internetworked Security Defense?

                       
 Encryption
                          Firewalls
                          E-mail Monitoring
                          Intuitive and sensory derived future images
                          Parallel CPUs

Question 10:   Which one of the following would NOT be considered as a way that a computer virus can enter a computer system?

                       
 E-mail and file attachments
                          Borrowed copies of software
                          Downloaded copies of shareware.
                          Running antivirus programs.
 


This page was last updated on 04/15/07.