MIS 535 WEEK 7 HOMEWORK

MIS 535 WEEK 7
Grading Summary
These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below.	Date Taken:	6/17/2014
Time Spent:	10 min , 15 secs
Points Received:	20 / 20  (100%)

Question Type:	# Of Questions:	# Correct:
Multiple Choice	20	20


Grade Details - All Questions
Question 1.	Question :	Social media sites result in loss of personal information because

 	Student Answer:		  sites lack appropriate tools to prevent security fraud.

 			  hackers spend more time working to penetrate the sites.

 		 	  users are not careful and share inappropriate business or personal information.
 			  Wikileaks is publishing social media site information.

 	Instructor Explanation:	Week 7 Lecture


 	Points Received:	1 of 1
 	Comments:	



Question 2.	Question :	Information systems

 	Student Answer:		  pose traditional ethical situations in new manners.

 		 	  raise new ethical questions.

 			  raise the same ethical questions created by the Industrial Revolution.
 			  raise ethical questions primarily related to information rights and obligations.
 	Instructor Explanation:	p. 124


 	Points Received:	1 of 1
 	Comments:	



Question 3.	Question :	The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

 	Student Answer:		  due process.

 		 	  accountability.

 			  courts of appeal.

 			  the judicial system.

 	Instructor Explanation:	p. 129


 	Points Received:	1 of 1
 	Comments:	



Question 4.	Question :	The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called

 	Student Answer:		  liability.

 		 	  due process.

 			  courts of appeal.

 			  FOI appeals.

 	Instructor Explanation:	p. 129


 	Points Received:	1 of 1
 	Comments:	



Question 5.	Question :	Immanuel Kant's Categorical Imperative states that

 	Student Answer:		  if an action cannot be taken repeatedly, then it is not right to be taken at any time.
 			  one should take the action that produces the least harm or incurs the least cost.
 			  one can put value in rank order and understand the consequences of various courses of action.
 		 	  if an action is not right for everyone to take, it is not right for anyone to take.
 	Instructor Explanation:	p. 130


 	Points Received:	1 of 1
 	Comments:	



Question 6.	Question :	The ethical "no free lunch" rule states that

 	Student Answer:		  if an action cannot be taken repeatedly, then it is not right to be taken at any time.
 			  one should take the action that produces the least harm or incurs the least cost.
 			  one can put values in rank order and understand the consequences of various courses of action.
 		 	  everything is owned by someone else, and that the creator wants compensation for this work.
 	Instructor Explanation:	p. 130


 	Points Received:	1 of 1
 	Comments:	



Question 7.	Question :	European privacy protection is _____ than in the United States.

 	Student Answer:		  less far-reaching

 			  less liable to laws

 			  much less stringent

 		 	  much more stringent

 	Instructor Explanation:	p. 134


 	Points Received:	1 of 1
 	Comments:	



Question 8.	Question :	Intellectual property can best be described as

 	Student Answer:	 	  intangible property created by individuals or corporations.

 			  unique creative work or ideas.

 			  tangible property created from a unique idea.

 			  the manifestation of an intangible idea.

 	Instructor Explanation:	pp. 138-139


 	Points Received:	1 of 1
 	Comments:	



Question 9.	Question :	It is not feasible for companies to produce error-free software because

 	Student Answer:		  any programming code is susceptible to error.

 		 	  it is not possible to create perfect software on a large scale.

 			  errors can be introduced in the maintenance stage of development.
 			  any software of any complexity will have errors.

 	Instructor Explanation:	p. 143


 	Points Received:	1 of 1
 	Comments:	



Question 10.	Question :	The practice of spamming has been growing because

 	Student Answer:		  it is unregulated.

 			  it is good advertising practice and brings in many new customers.

 			  it helps pay for the Internet.

 		 	  it is so inexpensive and can reach so many people.

 	Instructor Explanation:	p. 145


 	Points Received:	1 of 1
 	Comments:	



Question 11.	Question :	Which of the five moral dimensions of the information age does spamming raise?

 	Student Answer:	 	  Quality of life

 			  System quality

 			  Accountability and control

 			  Information rights and obligations

 	Instructor Explanation:	p.s 125-126


 	Points Received:	1 of 1
 	Comments:	



Question 12.	Question :	Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to

 	Student Answer:	 	  security.

 			  controls.

 			  benchmarks.

 			  algorithms.

 	Instructor Explanation:	p. 293


 	Points Received:	1 of 1
 	Comments:	



Question 13.	Question :	Security challenges posed by the communications between layers in a client/server environment are

 	Student Answer:		  line taps and denial of service attacks.

 		 	  tapping, sniffing, and message alteration.

 			  computer viruses, line taps, and loss of machine.

 			  vandalism, theft and fraud, and line taps.

 	Instructor Explanation:	p. 293


 	Points Received:	1 of 1
 	Comments:	



Question 14.	Question :	Phishing involves

 	Student Answer:		  redirecting users to a fraudulent website even when the user has typed in the correct address in the Web browser.
 			  pretending to be a legitimate business' representative in order to garner information about a security system.
 		 	  pretending that attached information is from a business associate, or directing users to fake websites.
 			  Using e-mails for threats and harassment.

 	Instructor Explanation:	p. 301


 	Points Received:	1 of 1
 	Comments:	



Question 15.	Question :	Evil twins are

 	Student Answer:		  Trojan horses that appears to the user to be legitimate commercial software applications.
 			  E-mail messages that mimic the e-mail message of a legitimate business.
 			  Fraudulent websites that mimic a legitimate business's website.

 		 	  bogus wireless networks that look legitimate to users.

 	Instructor Explanation:	p. 301


 	Points Received:	1 of 1
 	Comments:	



Question 16.	Question :	The HIPAA Act of 1996

 	Student Answer:		  requires financial institutions to ensure the security of customer data.
 			  specifies best practices in information systems security and control.
 			  imposes responsibility on companies and management to safeguard the accuracy of financial information.
 		 	  outlines medical security and privacy rules.

 	Instructor Explanation:	p. 306


 	Points Received:	1 of 1
 	Comments:	



Question 17.	Question :	Financial institutions are required to ensure the security and confidentiality of customer data through the

 	Student Answer:		  Investor Protection Act.

 		 	  Financial Services Modernization Act of 1999.

 			  Financial Security Act of 1997.

 			  Personal Security and Confidentiality Act of 1986.

 	Instructor Explanation:	p. 306


 	Points Received:	1 of 1
 	Comments:	



Question 18.	Question :	Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

 	Student Answer:		  are usually embedded in legacy systems that are easy to access.

 			  are not secure because the technology to secure them did not exist at the time the files were created.
 		 	  have the potential to be accessed by large numbers of people and by groups outside of the organization.
 			  are frequently available on the Internet.

 	Instructor Explanation:	p. 293


 	Points Received:	1 of 1
 	Comments:	



Question 19.	Question :	The vulnerability inherent in wireless networking is due to

 	Student Answer:		  use of the SSIDs.

 		 	  broken encryption or users who do not set up secure systems.

 			  the lack of robust encryption capabilities.

 			  the lack of protection against war driving.

 	Instructor Explanation:	p. 317


 	Points Received:	1 of 1
 	Comments:	



Question 20.	Question :	Statement ranking information risks are included in a(n)

 	Student Answer:	 	  security policy.

 			  AUP.

 			  risk assessment.

 			  business impact analysis.

 	Instructor Explanation:	p. 310


 	Points Received:	1 of 1
 	Comments:	




Answer Detail

Get This Answer

Invite Tutor