OLI quizzes are based entirely on material in the OLI module content, not on external resources or personal experience.
Where would you expect to find the following statement?
“I shall be willing to share my knowledge and expertise with others and always act in such a way that reflects favorably on my profession.”
How is “compromise” defined in the context of information technology and information security?
Which of the following would most likely prevent your becoming a victim of cyberstalking while using social networking?
Using any of several different tools (Online White pages, Peoplefinders, Wink People Finder, etc.) someone has found your name and address. What other information would be needed in order for them to access your ONLINE bank account or credit card account records?
Part 2: 10 points
Part 3: 10 points
Which of the following would be considered purposes of the Digital Millennium Copyright Act? Select Yes or No for each option.
To discourage internet service providers from allowing file transfers
To outline penalties for bypassing or providing tools to bypass protection mechanisms built into copyrighted software
To provide scenarios that define when it is legal to copy and sell copyrighted software
Would the following behavior most likely be a violation of an employee code of conduct?
Using your work computer to invite friends and co-workers to a party at your home.
You misplaced your company ID badge. Unfortunately, you had just changed your password and taped it to the back of the badge. It would not be difficult for someone to guess your user ID. With those two pieces of information, someone could access the files you have permission to work with, change the data stored there, delete files, or alter the access to the files. Which of the following is at risk in this scenario? Select Yes or No for each option.
The confidentiality of the data
The integrity of the data
The accessibility of the data
Unsolicited e-mail messages sent from advertisers or cyber criminals are--spamspyware.
Which of the following is a sure sign that your computer is compromised?
Which of the following statements are true regarding PII? Select True or False for each option.
PII is information that uniquely identifies you in records that can be obtained online.
PII is always used to illegally gain access to your online records.
PII is safe because only you have this combination of name, social security number, and bank account, credit card numbers, or driver’s license number.
Which option here would be a way to remember the user IDs and passwords that poses less risk than other options listed.
Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the middle of placing an online order when friends arrive and she stops her work to visit. What is her best (and most convenient) way to protect the PII that she has already entered (she has only logged onto a site with her ID and password and put some items in her basket for purchase)?
Which of the following is the biggest risk of using social networking?
A user access agreement typically is --narrowerbroader than the list of employee expected behaviors within an organization.
Type your question here (or upload an image)
Brown University1271 Tutors
California Institute of Technology2131 Tutors
Carnegie Mellon University982 Tutors
Columbia University1256 Tutors
Dartmouth University2113 Tutors
Emory University2279 Tutors
Harvard University599 Tutors
Massachusetts Institute of Technology2319 Tutors
New York University1645 Tutors
Notre Dam University1911 Tutors
Oklahoma University2122 Tutors
Pennsylvania State University932 Tutors
Princeton University1211 Tutors
Stanford University983 Tutors
University of California1282 Tutors
Oxford University123 Tutors
Yale University2325 Tutors
Enter the email address associated with your account, and we will email you a link to reset your password.
Forgot your password?
Business & Finance
How it Works
Become a Tutor
Media & Press
Studypool inc. © 2015
Studypool is a marketplace that helps students get efficient academic help.