Prior to writing your report, you must submit a short (a page and half) Project Proposal, indicating the name and relevant aspect(s) of the organization you intend to use as a subject for your report. The proposal must be accompanied by an annotated bibliography submitted via the assignment folder. Your instructor will provide feedback as to the suitability of your subject and bibliography. Additional details are provided below.

Risk Assessment Report Instructions

 

INFA 610

 

Background

 

This is an individual research project. The objective of the research project is to develop an Information Asset Risk Assessment Reportfor an organization of your choosing, and worth 25% of your total course grade. The report will be due by the end of the 11th week. The analysis should be conducted using only publicly available information (that is, information obtainable on the Internet, company reports, news reports, journal articles, etc.). The risk analysis should consider legitimate, known threats that pertain to the subject organization. Based on the information gathered, presumed vulnerabilities of the company or organization’s computing and networking infrastructure will be identified. Then, based on the identified threats and vulnerabilities, you will describe the risk profile for the subject organization and suggest recommendations to mitigate the risks.

Your report should be 12 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the report in your Assignment Folder prior to the submission deadline.

 

Project Proposal

 

Prior to writing your report, you must submit a short (a page and half) Project Proposal, indicating the name and relevant aspect(s) of the organization you intend to use as a subject for your report. The proposal must be accompanied by an annotated bibliography submitted via the assignment folder. Your instructor will provide feedback as to the suitability of your subject and bibliography. Additional details are provided below.

 

You will submit a project proposal of your Risk Assessment Report by the end of Session 4. The project proposal will account for 10% of your research paper grade (2.5% of your total course grade).

 

The project proposal should be a page and half (double spaced) description of the organization that you propose to analyze, with a summary of the scope (e.g., entire organization, key business area, major system, etc.) for the risk assessment you are expected to conduct. The proposal should identify the subject organization with a brief explanation of why you chose the subject for this assignment. The proposal should also describe the research methods to be used and anticipated sources of research information sources. Your instructor will use the proposal to provide feedback on the suitability of the proposed subject organization and the scope you propose, as well as the suitability of the proposed research methods and information sources. If you do not provide a proposal, you will be preparing their Risk Assessment Reports “at risk;” i.e., they will run the risk of delivering a report that is not suitable for this course.

 

 

An important step in developing your Risk Assessment Report will be the construction of an Annotated Bibliography. Having developed and described a subject organization and scope of analysis in the proposal, the next step is to identify and assess the value of potential research material. You should identify five (5) to six (6) significant articles relevant to your subject organization and to identifying and assessing risks in a context similar to the scope of your report. For a report of this nature you may expect to find useful sources in both business-focused (e.g., Business Source Premier, Business and Company Resource Center, ABI/Inform) and technically-focused databases (e.g., ACM Digital Library, IEEE, Gartner.com). The annotated bibliography will consist of 100-250 words per article, that describe the main ideas of the article, a discussion of the usefulness of such an article in understanding various aspects of you report, and other  comments you might have after reading the article. For each article, there should be a complete reference in APA format. Your Annotated Bibliography will then form the basis of the sources for your report. (You may also supplement the references used in your report with additional reference material.)

 

Some excellent guidance on how to prepare an annotated bibliography can be found at http://www.library.cornell.edu/okuref/research/skill28.htm.

 

Risk Assessment Report Proposal and Annotated Bibliography should be submitted by the end of Session 4.

 

The grading criteria for the proposal are as follows:

1.      Organization Selected & Justification (Right Scope and Relevance): 60%

2.      Research methods proposed (Bibliography): 40%

 

Risk Assessment Report

 

The Risk Assessment Report should be a polished, graduate-level paper. Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information in the report. UMUC policies regarding plagiarism will apply to the Risk Assessment Report as well as all other deliverables in this course. You must submit the report to Turnitn.com to improve the originality score before submitting the report in the Assignment Folder. The lower the originality score the better it is. You should aim for an originality score of 10%..

 

Please submit questions regarding the research paper to the INFA610 “Q&A” Conference.

 

The Risk Assessment Report should be submitted by the end of Session 11

 

 

Risk Assessment Report Overview

 

The objective of this assignment is to develop a Risk Assessment Report for a company, government agency, or other organization (the “subject organization”). The analysis will be conducted using only publicly available information (e.g., information obtainable on the Internet, company reports, news reports, journal articles, etc.) and based on judicious, believable extrapolation of that information. Your risk analysis should consider subject organization information assets (computing and networking infrastructure), their vulnerabilities and legitimate, known threats that can exploit those vulnerabilities. Your assignment is then to derive the risk profile for the subject organization. Your report should also contain recommendations to mitigate the risks.

 

There is a wealth of business-oriented and technical information that can be used to infer likely vulnerabilities and assets for an organization. It is recommended that students select their organizations based at least in part on ease of information gathering, from a public record perspective.

 

Steps to be followed:

 

1. Pick a Subject Organization: Follow these guidelines:

 

a.       No insider or proprietary information. All the information you collect must be readily available for anyone to access. You will describe in your proposal how you intend to collect your information.

b.      You should pick a company or organization that has sufficient publicly available information to support a reasonable risk analysis, particularly including threat and vulnerability identification.

 

2. Develop Subject Organization Information: Examples of relevant information includes:

 

a.       Company/Organization name and location

b.      Company/Organization management or basic organization structure

c.       Company/Organization industry and purpose (i.e., the nature of its business)

d.      Company/Organization profile (financial information, standing in its industry, reputation)

e.       Identification of relevant aspects of the company/organization’s computing and network infrastructure,Note: Do not try to access more information through Social Engineering, or through attempted cyber attacks or intrusion attempts.

 

3. Analyze Risks

 

a.       For the purposes of this assignment, youwill follow the standard risk assessment methodology used within the U.S. federal government, as described in NIST Special Publication 800-30 (United States. National Institute of Standards and Technology  (2002). Risk Management Guide for Information Technology Systems (Special Publication 800-30). Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf)

b.      In conducting your analysis, focus on identifying threats and vulnerabilities faced by your subject organization.

c.       Based on the threats and vulnerabilities you identify, next determine both the relative likelihood and severity of impact that would occur should each of the threats materialize. This should produce a listing of risks, at least roughly ordered by their significance to the organization.

d.      For the risks you have identified, suggest ways that the subject organization might respond to mitigate the risk.

 

4. Prepare Risk Assessment Report

 

a.       Reports should be 12 pages(exclusive of cover, title page, table of contents, endnotes and bibliography), double-spaced, and should follow a structure generally corresponding to the risk assessment process described in NIST Special Publication 800-30.

b.      The report should be prepared using the APA Style. All sources of information should be indicated via in-line citations and a list of references.

c.       Reports should be submitted via the Assignment Folder.

 

Grading Criteria

 

As previously stated, the Proposal and Annotated Bibliography will constitute 10% of your Risk Assessment Report grade (2.5% of your final grade). You will demonstrate in the final report your risk assessment subject matter competency and communication and knowledge competencies. The Risk Assessment Report, accounting for 22.5% of the final grade, will be assessed as follows:

 

·         Clear statement of scope to be analyzed and appropriate coverage of that scope: 10%

·         Technical Content (depth and accuracy of information and analysis): 30%

·         Recommendations for risk mitigation or other conclusions supported by research and analysis: 10%

·         Communications competency: 25% (assessed using a graduate school wide rubric)

·         Knowledge competency: 25%(assessed using a graduate school wide rubric)

 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Who are the project stakeholders? How will they be involved in the project? Who should be the project sponsor? Why? From which department should the project manager come? Why?

Winsome Manufacturing Company produces plastic storage containers and sells them to the home consumer through home sales events. At the company’s quarterly meeting, the head of marketing described a new product to be introduced in the first quarter of the next fiscal year, approximately 9 months from now. The product will be a room-sized plastic storage unit suitable to the outside of the home; it is similar to a competitor’s product but will have significantly more features. This product will open new markets for the sales channel, lay the foundation for add-on products, and generate new revenues. Management has only seen preliminary sketches of the potential product but are very excited by the new product.

The project will require participation from the design, production, purchasing, shipping, sales, and marketing departments. Winsome Manufacturing owns a line of suitable injection molds, so all manufacturing will be done in-house. The project manager for this project has not yet been selected, but that decision is expected to be made in the next week.

A preliminary project initiation meeting will result in the identification of the project sponsor, selection of a project manager, and creation of the project charter. A manager in the production department who knows you are taking a college project management course asks you to prepare a brief report to help him prepare for the meeting by answering the following questions:

  • Who are the project stakeholders? How will they be involved in the project?
  • Who should be the project sponsor? Why?
  • From which department should the project manager come? Why?
  • What skills and experience are likely needed by the project manager for each phase in the project life cycle, and how do they differ between the various phases?
  • What type of communication plan will likely be needed during the project?
    • What information should be shared with the project stakeholders?
    • What is the mechanism that could be used for each type of information?
    • What is the frequency with which information should be shared?
    • What should be done if project communications are not proving to be effective?
    • What technology could be used for project communications?
    • At what point could communication about the project become an ethical or legal issue?
  • What information should be included in the following elements of the project charter:
    • What is the problem the project proposes to address?
    • What business opportunity might project completion create?
    • What is the business case for undertaking the project?
    • What is the financial impact of the project?
    • What are the expected results of the project?
    • What value will the project add?
    • What are risks that might be involved with undertaking the project?
    • What is the potential impact to the company if the project is not undertaken?

Present your findings as a Word document of 4–5 pages (not including title and reference pages) formatted in APA style.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

This week you will continue your comprehensive marketing plan researching the SAME company that you researched in previous units. Again, utilizing the Online Library, you will research the various elements of the marketing plan as it relates to this company. In Unit V you will provide a comprehensive discussion of place or distribution strategies of your company.

Unit V Research Project      The company is    ” Coca Cola”

 

Marketing Plan

 

This week you will continue your comprehensive marketing plan researching the SAME company that you researched in previous units. Again, utilizing the

Online Library, you will research the various elements of the marketing plan as it

relates to this company. In Unit V you will provide a comprehensive discussion of place or distribution strategies of your company.

 

Place

 

This section will provide a comprehensive look at the distribution strategy of your organization. Begin with an identification of the distribution channels

That should include the entire path that the products travel from the “manufacturer” to the final consumer. This might involve manufacturing plants, wholesalers, distributors, retailers and various other intermediaries. Why and how does your company use these intermediaries? Many companies use multiple channels

, particularly with the advent of the internet ( which is considered a direct channel

).Another element to include is a description of a physical facility. This might include a manufacturing plant, bottling plant, retail location, or even a unique merchandising effort.

 

 

Competitive Advantage

 

Because competitive advantage is an important goal of every company, address whether your company has a competitive advantage WITH RESPECT TO

PLACE. The idea is to discuss whether your company has a competitive advantage with  respect to how they distribute their products.This should discuss their distribution channel and maybe a unique retail location (if pertinent). Again, this section should only discuss whether your company has a competitive advantage with respect to place (product, price and promotion are discussed in other sections). Once you have stated your position, remember to include your rationale.

 

Your submission should be a minimum of two pages in length, double-spaced with a reference page and title page. References should include at least one additional,credible reference beyond the textbook. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and cited per APA guidelines. Include the use of subheadings (this week consider using Place and Competitive Advantage in Place).

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Research the organizational structure of the United Nations Human Rights Council. What are the goals of the organization? How is it structured to accomplish those goals? Discuss if it is accomplishing those goals and, if it is not accomplishing those goals, suggest possible changes to streamline the organization.

Research the organizational structure of the United Nations Human Rights
Council. What are the goals of the organization? How is it structured to accomplish those goals? Discuss if it is accomplishing those goals and, if it is not accomplishing those goals, suggest possible changes to streamline the organization.
The essay should be two to three pages in length and properly formatted to include a title page, running head, page numbers, and reference list. The paper should follow APA guidelines for all resources for in text citations, paraphrasing,
and references. Remember to use the Online Library to assist you in the research for this assignment.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Identify what the problem is and what type of training is being proposed. Relate this to the organization’s strategic imperatives. 2. Prepare an overview of why the training is needed. Include the learning objectives that you have identified for the program

Build a training plan. Identify a common training problem that organizations struggle with and the best way to address this problem. Examples include: change management, technology implementation, communication, team building, and conflict resolution. Also, determine how to implement the training by identifying the method of delivery (computer based). Follow these steps:

1. Write the report.

2. Prepare the PowerPoint presentation.

The report/presentation must include:

An eight to 10 page double spaced paper (not counting the cover page, abstract, and reference page) with appropriate references.

APA Requirements- minimum 6 citations/ sources

.

An executive level presentation (summary) not to exceed four PowerPoint slides.

The report must include the following items:

1. Identify what the problem is and what type of training is being proposed. Relate this to the organization’s strategic imperatives.

2. Prepare an overview of why the training is needed. Include the learning objectives that you have identified for the program.

3. Research best practices on how to train toward this problem. Discuss what other organizations have done to train on this topic. You can include White Papers.

4. Create a flowchart of the process to conduct research and collect data for decision making (which does not have to fit any specific process form; just make it clear).

5. Outline an abbreviated needs analysis, including a high-level assessment of skills, costs, and risks.

6. Propose high-level training solutions, including recommendations and justifications for development, implementation, technologies, and assessment type (or justification that training is not a solution that will adequately address the issue, and present proposal for a non-training solution).

7. Write a conclusion that reiterates the recommendation and ties it back to the best practices of other organizations.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

This element of the communication model represents the content of communication. A) noise B) receiver C) channel D) message E) source

1) This element of the communication model represents the content of communication.

A) noise

B) receiver

C) channel

D) message

E) source

2) This element of the communication model represents the medium used to transmit the communication.

A) message

B) channel

C) receiver

D) source

E) noise

3) This theory of mass communication says people are influenced by opinion leaders who may change from issue to issue.

A) Agenda Setting Hypothesis

B) Magic Bullet Theory

C) Diffusion Theory

D) N-Step Theory

E) Uses and Gratifications Theory

4) According to Abraham Maslow, ________ is/are the most basic order of needs people have.

A) acceptance

B) safety needs

C) self-actualization

D) self-esteem

E) physiological needs

5) The purpose of Monroe’s Motivated Sequence is to ________.

A) anticipate future trends

B) study the evolution of public opinion

C) measure public opinion

D) build persuasive messages

E) counteract Maslow’s Hierarchy of Needs Unit 2 Examination

6) According to Aristotle, an appeal to one’s reason is known as ________.

A) pathos

B) ethos

C) eggos

D) legos

E) logos

7) ________ is what happens when a public debate leads to a consensus.

A) A social action

B) An issue

C) A social value

D) An already present mass sentiment

E) Public opinion

8) When public relations practitioners attempt to manipulate public opinion, they run the risk of losing their ________.

A) credibility

B) license

C) accreditation

D) respect

E) innocence

9) Communicating an idea in such a way that an audience is influenced, either intentionally or unintentionally, by the way it is expressed is known as ________.

A) spinning

B) manipulation

C) framing

D) shading

E) coloring

10) The Ten Commandments is an example of ________.

A) an organizational ethics code

B) a really, really long movie

C) a professional ethics code

D) a societal ethics code

E) a personal ethics codes

11) When you evaluate an ethical dilemma by determining definitions, values, principles and loyalties, you are applying the ethical process known as ________.

A) Utilitarianism

B) the veil of ignorance

C) the Potter Box

D) the golden mean

E) values-driven public relations Unit 2 Examination

12) In an ethical dilemma, when you try to understand the situation from others’ viewpoints, you are applying the ethical principle known as ________.

A) the Potter Box

B) the veil of ignorance

C) the golden mean

D) values-driven public relations

E) Utilitarianism

13) The public relations practitioner’s role as a relationship manager ________.

A) resolves the misleading question of whether one should serve as an advocate or as an objective observer

B) can mean that sometimes it is necessary to be an advocate

C) can involve the delivery of unpopular truths

D) All of the above.

E) None of the above.

14) The believe that one system of ethics is superior to all others and leaves no room for flexibility is known as ________.

A) cultural relativism

B) cross-cultural ethics

C) the golden mean

D) ethical imperialism

E) dilemmas

15) Immanuel Kant’s categorical imperative requires one to make ethical decisions as if _______.

A) we have reach the “Golden Mean of Enlightenment”

B) it’s the end of the world as we know it

C) there is a veil of ignorance descending upon the world

D) they would be applied as rules you want everyone else to follow

E) it were a life or death situation

16) ROI stands for ________.

A) return on investment

B) relevance of information

C) relationship ordinal indexing

D) real or imagined

E) rate of interest Unit 2 Examination

17) “What is your favorite color?” is an example of ________.

A) a closed-ended question

B) an open-ended question

C) a rating-scale question

D) a trick question

E) a dichotomous question

18) Research that focuses upon determining the issues and the client’s stake in those issues is ________.

A) stakeholder research

B) quantitative research

C) client research

D) evaluation research

E) problem-opportunity research

19) When everyone in a sampling frame is included in the sample, the sampling technique is known as ________.

A) simple random sampling

B) cluster sampling

C) a census

D) systematic sampling

E) cross-tabulation sampling

20) The Pentagon came under sharp criticism in 2003 when it created a PAM, an online trading market designed to predict ________.

A) the flow illegal immigration into the U.S.

B) future terrorist activities

C) future economic conditions

D) the effects of global warming

E) military intentions of other nations

21) A public relations plan that contains strategies for dealing with a situation that may arise is called ________.

A) an adhoc plan

B) a logistical plan

C) a flexible plan

D) a contingency plan

E) a standing plan

22) Crisis communications plans are a form of ________.

A) standing plan

B) logistical plan

C) contingency plan

D) flexible plan

E) ad hoc plan

23) Generalized statements of the outcomes you hope your plan will achieve are ________.

A) building consensus

B) tactics

C) objectives

D) brainstorming

E) goals

24) An accurate and unbiased description of the reasons why it has become necessary to take public relations actions is known as ________.

A) a planning grid

B) team building

C) a situation analysis

D) goal setting

E) evaluative research

25) A good plan is ________.

A) one that includes free balloons for the kids

B) linked to dynamic and creative tactics

C) one that is inexpensive

D) makes targeted audiences happy

E) tied to a specific goal

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Which of the following is TRUE about conflict? Answers: a. It is not so much the conflict that creates the problem as the way in which you approach and deal with the conflict. b. If two people engage in relationship conflict, it means their relationship is unhealthy. c. Conflict hurts an interpersonal relationship. d. Conflict is bad because it reveals our negative selves.

Question

Question 1

Which of the following is TRUE about conflict?

Answers:

a. It is not so much the conflict that creates the problem as the way in which you approach and deal with the conflict.

b. If two people engage in relationship conflict, it means their relationship is unhealthy.

c. Conflict hurts an interpersonal relationship.

d. Conflict is bad because it reveals our negative selves.

Question 2

_____________________ conflict centers on facts—objects, events, and persons in the world usually external to the people involved in the conflict.

Answers:

a. Inferential

b. Factual

c. Content

d. Relationship

Question 3

Which is the ideal style of conflict?

Answers:

a. collaborating

b. accommodating

c. avoiding

d. competing

Question 4

This style of conflict management represents great concern for your own needs and desires and little concern for the needs and desires of others.

Answers:

a. competing

b. collaborating

c. accommodating

d. avoiding

Question 5

Which of the following is NOT true in regard to online conflict?

Answers:

a. Online conflict is usually more positive than face-to-face conflict.

b. The same conflicts that arise in face-to-face conflict can happen in online conflict.

c. It can range from posting irrelevant messages to trolling.

d. Online conflict often centers on the violation of Internet courtesy.

Question 6

When Leonardo and Kate argue, Kate’s all-too-frequent strategy is to bring up all of Leonardo’s previous failures and indiscretions. Kate’s behavior is best described as

Answers:

a. blame.

b. silencers.

c. gunnysacking.

d. face-detracting.

Question 7

Anna is willing to speak up when she feels like she has a point to make and is defending a cause she believes in. Anna will score high on

Answers:

a. aggressiveness.

b. extroversion.

c. assertiveness.

d. argumentativeness.

Question 8

Whenever, he engages in conflict, Tommy starts yelling, which prevent his partner from constructively responding. This is an example of the use of (a)

Answers:

a. gunnysacking.

b. silencer.

c. beltlining.

d. catastrophizing.

Question 9

Physical flight, falling asleep, or just mentally withdrawing are all examples of

Answers:

a. gunnysacking.

b. avoidance.

c. redefinition.

d. empathy.

Question 10

_____________________ hat asks that you look at the upside.

Answers:

a. Positive benefits

b. Negative

c. Feeling

d. Fact

Question 11

The most common type of verbal aggressiveness is

Answers:

a. cursing.

b. character attack.

c. threatening.

d. teasing.

Question 12

Which of the following is NOT a way to communicate equality when dealing with conflict?

Answers:

a. stress your own opinions first

b. avoid interrupting

c. recognize cultural differences

d. make requests and avoid demands

Question 13

John really didn’t want to take on another shift Saturday, but he didn’t want to make waves with his supervisor, so he said yes. This is an example of the ____________ conflict style.

Answers:

a. avoiding

b. collaborating

c. compromising

d. accommodating

Question 14

Ryley and Tyler were trying to decide which movie to go to—the comedy film or the new romance film. They decide to go to the comedy film tonight and see the romance film next week. This is an example of

Answers:

a. compromising.

b. competing.

c. avoiding.

d. accommodating

Question 15

_______________________ techniques involve helping the other person to maintain a

Answers:

a. Face-enhancing

b. Avoidance

c. Gunnysacking

d. Face-detracting

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Which of the following is NOT a mitigation best practice for online banking risks? Question 1 options: Site encryption A shared computer Authentication security Virus scanning

Question 1 (1 point)

Which of the following is NOT a mitigation best practice for online banking risks?

Question 1 options:

Site encryption

A shared computer

Authentication security

Virus scanning

Question 2 (1 point)

Which of the following are two of the most common online banking threats?

Question 2 options:

Spoofing and phishing

Spoofing and ransomware

Persuasion and shoulder surfing

Phishing and persuasion

Question 3 (1 point)

Which of the following is a means of authentication?

Question 3 options:

Neither A nor B

Kerberos

Both A and B

Public key infrastructure (PKI)

Question 4 (1 point)

In a path traversal attack, the attacker commonly uses __________ to navigate the directory tree to access files in other directories.

Question 4 options:

Boolean Boolean

characters

Windows Explorer

None of the above

Question 5 (1 point)

Data processing converts __________.

Question 5 options:

conclusions into facts

facts into conclusions

information into data

data into information

Question 6 (1 point)

___________ involves protecting sensitive data through encryption.

Question 6 options:

Insecure cryptographic storage

Failure to restrict URL access

Broken authentication and session management

Insecure communications

Question 7 (1 point)

Which of the following is NOT a form of social engineering?

Question 7 options:

Dumpster diving

Shoulder surfing

Phishing

Ransomware

Question 8 (1 point)

Which of the following is a type of hacker?

Question 8 options:

Social engineer

CISSP

Trojan horse

Man-in-the-middle

Question 9 (1 point)

Although manually operated, what was one of the first complex data processing devices?

Question 9 options:

The Analytical Engine

The punch card tabulating system

The Difference Engine

The abacus

Question 10 (1 point)

What uses Authentication Header (AH) and Encapsulating Security Payload (ESP) to create secure data transmissions?

Question 10 options:

XSS

IPSec

DNS

SSL

Question 11 (1 point)

Which of the following is not a common phase of customer life cycle management?

Question 11 options:

Retention

Inception

Conversion

Acquisition

Question 12 (1 point)

Your company has several small branch offices spread throughout the state. Which of the following is the best choice to help branch office personnel meet and work on projects without incurring the cost of traveling?

Question 12 options:

Social media

Audio conferencing

VoIP

Unified collaborative communications (UCC)

Question 13 (1 point)

Which security tenet emphasizes the need for the information to be delivered unaltered to the recipient?

Question 13 options:

Integrity

Authorization

Confidentiality

Availability

Question 14 (1 point)

Which of the following helps to ensure the confidentiality and integrity of data communications?

Question 14 options:

DNS

IPSec

TCP/IP

SNMP

Question 15 (1 point)

Which of the following acts as an intermediary for requests from clients seeking resources from other servers?

Question 15 options:

Perimeter defense

Proxy server

DMZ

Firewall

Question 16 (1 point)

Software that executes on two or more computers in a network is a ___________ application.

Question 16 options:

client/server

Mainframe

Distributed

Peer to peer

Question 17 (1 point)

Which of the following best describes a cookie?

Question 17 options:

A small data file that a Web site may write to your hard drive

A small software program that is stored on a piece of hardware and may be updated to add more functionality

A type of shopping cart

A type of short-range communication network

Question 18 (1 point)

Which of the following is a physical or logical subnetwork that hosts an organization’s external services to an outside network, such as the Internet?

Question 18 options:

Proxy server

Perimeter defense

DMZ

Firewall

Question 19 (1 point)

Which of the following techniques would help a Web application to properly validate user input?

Question 19 options:

Using SSL for all user input

Whitelisting and accepting only known good characters

Blacklisting unknown IP addresses

Cleansing all data in the database

Question 20 (1 point)

The buying and selling of goods and services over the Internet is commonly referred to as __________.

Question 20 options:

social purchasing

brick and mortar sales

network commerce

e-commerce

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

1 out of 1 points An applicant who is not hired but who would have performed successfully if hired is a _______. A. true positive B. false positive C. true negative D. false negative

Question 14

1 out of 1 points

An applicant who is not hired but who would have performed successfully if hired is a _______.

A. true positive

B. false positive

C. true negative

D. false negative

Question 15

1 out of 1 points

Turnover due to organizational downsizing is classified as ______.

A. voluntary

B. involuntary

C. supplemental

D. it depends on the circumstances of the downsizing

Question 16

1 out of 1 points

Which of the following is an attribute of a low value employee that an organization would not want to prevent from leaving?

A. little intellectual capital

B. high seniority

C. high performance

D. all of the above

Question 17

1 out of 1 points

When using ___________, finalists are banded together into rank-ordered categories.

A. ranking

B. random selection

C. clinical prediction

D. grouping

Question 18

1 out of 1 points

Downsizing is typically a reflection of __________.

A. overstaffing

B. understaffing

C. an appropriate staffing level

D. none of the above

Question 19

1 out of 1 points

Which of the following functions are most likely to be outsourced?

A. recruiting creative talent for an advertising agency

B. screening registered nurses for a long-term care facility

C. recruiting and selecting individuals for teams

D. providing employee orientation

Question 20

1 out of 1 points

One problem that has been shown to accompany downsizing is _____.

A. increased payroll costs

B. decreases in employee health and motivation

C. most companies fail to downsize sufficiently

D. insufficient attention to issues of seniority

Question 21

1 out of 1 points

In a ________ analysis, the target employee population is split in half, and the new HR program is initiated with only one of these halves.

A. longitudinal

B. split-sample

C. LISREL

D. factor

Question 22

1 out of 1 points

Which of the following is not a part of normal progressive discipline?

A. Give employees notice of the rules of conduct

B. Provide employees with alternative employment if performance problems persist

C. Allow for full investigation of alleged employee misconduct

D. Give employees the right to appeal a decision

Question 23

1 out of 1 points

The most sensible approach for addressing the issue of applicant truthfulness would be to ________.

A. receive applicant information in good faith since the majority of applicants will be honest and it is not fair to inconvenience everyone with more verification because of a few “bad apples.”

B. treat applicants with trust and they will respond with honesty in most cases.

C. have applicants provide independent, third-party documentation of all job information provided on application blanks.

D. verify the applicant information provided that is deemed most vital

Question 24

1 out of 1 points

In which of the following assessment procedures is the participation of line managers most needed?

A. Initial assessment

B. Substantive methods

C. Discretionary methods

D. Background investigations

Question 25

1 out of 1 points

What proportion of disputes that begin the EEOC mediation process are eventually resolved through mediation?

A. fewer than 10%

B. more than 10%, but fewer than half

C. more than half

D. the EEOC has no mediation procedure

Question 26

1 out of 1 points

The _________ method of determining an applicant’s score is based on assigning weights by statistical procedures and then adding predictor scores together.

A. multiple regression

B. clinical prediction

C. unit weighting

D. none of the above

Question 27

1 out of 1 points

As a general rule concerning job offers, it can be said that __________.

A. “low ball” job offers are expensive to the organization

B. “competitive” job offers have no important drawbacks

C. “competitive” job offers tend to leave room to negotiate

D. “competitive” offers usually stimulate the most positive reactions on the part of offer recipients

Question 28

1 out of 1 points

The delivery of newcomer socialization should be the responsibility of __________.

A. his/her supervisor

B. a mentor or sponsor

C. the HR department

D. all of the above

Question 29

1 out of 1 points

From a legal standpoint, if performance appraisal information is to be used in the retention management and termination process for an organization, the organization needs to ensure that the information is _____.

A. organizationally relevant

B. sufficiently general to cover a variety of situations

C. communicated in advance to the employee

D. all of the above

Question 30

1 out of 1 points

Which of the following statements about negligent hiring lawsuits against employers is accurate?

A. monetary damages are usually leveled against the employee found to be at fault

B. the plaintiff must present evidence the injury or harm was a foreseeable consequence of hiring the unfit employee

C. the employer has the initial burden to present evidence of proper hiring practice in such cases

D. suits of this kind are decreasing as companies in the private sector recognize the liabilities involved

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"