Search Header Logo

IBA Chapter 8A

Authored by George Jenness

Computers

8th - 12th Grade

Used 21+ times

IBA Chapter 8A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most secure method for sending information over the Internet?

Using passwords

Using patches

Using spyware

Using encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company is about to release a proprietary product. Suddenly a competitor releases a very similar product that uses design data exactly like that from your company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action?

Destroying all proprietary information

Restricting employees' Internet access

Monitoring employees' messages

Uninstalling employees' e-mail clients

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Web sites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer?

Audit the contents of this employee's hard drive.

Examine the cached files from the Internet on this employee's computer.

Restrict this employee's access to the Internet.

Monitor the messages this employee sends and receives via e-mail.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company has provided you with a desktop computer to use at work. You have configured your e-mail client on this work computer to include your personal e-mail account so that you can conveniently download messages and check your personal e-mail. Which of the following is true?

The company will block your personal e-mail account.

The company can read your personal e-mail messages.

The company is required by law to allow you to receive personal e-mail messages at work.

The company will ignore your personal e-mail messages out of respect for your privacy.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the "Right to Be Forgotten" argument, which asks

whether people have the right to reject the receipt of cookies from Web sites they visit.

whether people have the right to remove damaging information about themselves on the Internet.

whether people have the right to access social networking sites when they have forgotten their user names and passwords.

whether people have the right to remove themselves from newsgroups to avoid receiving spam.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Employers can monitor their employees' e-mail messages sent to and from the company network because:

this activity minimizes the amount of spam employees receive.

regular monitoring reduces the extent of infection by malware.

all information carried by the company's communication system is company property.

it prevents employees from using network resources too frequently

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Web sites, and you are selective when posting information to newsgroups. These actions will help you:

minimize the amount of spam you receive

protect original works of authorship under copyright law.

enforce the company's encryption policy for e-mail.

perform the IT job of Web site analyst.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?