QUESTION 1
According to the PCWorld article you read in the lab, the violation that occurred in the lab case study was that the:
two VA supervisors were responsible for implementing appropriate information systems security.
two VA supervisors were responsible for making external backup copies of the data.
VA data analyst was not authorized to take VA privacy data home on a laptop computer and make an external backup copy of the data.
the VA data analyst was not authorized to be a “whistleblower†about the incident.
10 points
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper Now
QUESTION 2
In the lab case study, the privacy data and privacy law rights of __________ were violated.
VA employees
VA management and executive officers
U.S. citizens and military personnel
IT administrative personnel
10 points
QUESTION 3
Which organization in the U.S. federal government is responsible for performing audits on other U.S. federal government agencies?
The U.S. Government Accountability Office (GAO)
The Federal Bureau of Investigation (FBI)
The Central Intelligence Agency (CIA)
The National Security Agency (NSA)
10 points
QUESTION 4
The PCWorld article you read in the lab revealed that the VA†s cybersecurity efforts were hampered by:
lack of “know-how.â€
bureaucracy.
political agendas.
inadequate staffing.
10 points
QUESTION 5
The loss of privacy data has implications:
only for the individual(s) whose privacy data has been lost.
only for the individual(s) responsible.
only for the organization involved.
for the individual(s) whose privacy data has been lost, as well as the individual(s) responsible and the organization involved.
10 points
QUESTION 6
In the lab case study, the VA secretary reprimanded and demoted the VA data analyst†s two supervisors because they:
took VA privacy data home on their laptop computers.
failed to report the incident immediately to appropriate officials.
did not take adequate information system security measures.
made external backup copies of privacy data.
10 points
QUESTION 7
Which of the following deals with the regulation of personal information about individuals which can be collected by governments and other public as well as private organizations and its storage and use?
Privacy laws
Agency policy
Security acts
Information systems security
10 points
QUESTION 8
Who was the weakest link in the chain of security and protection of privacy data in the lab case study?
The VA Inspector General
The VA†s executive management
The VA employee and the employee†s supervisors
The House Veterans†Affairs Committee
10 points
QUESTION 9
According to the PCWorld article you read in the lab, which of the following was stated as an issue in the lab case study?
The database was not encrypted.
The VA’s decentralized management.
The employee and supervisors were overworked.
The VA†s computer equipment was unable to adequately protect the privacy data in the database.
10 points
QUESTION 10
According to the PCWorld article you read in the lab, which of the following was reported by House Veterans†Affairs Committee?
The VA seemed to focus on agency-wide solutions rather than fixing individual medical centers.
The VA was ineffective because it had a centralized management and no divisions.
An annual cybersecurity review had given the VA a failing grade in four of the past five years.
The VA’s internal controls in data security had been mostly adequate in recent years.
10 points
QUESTION 11
In the lab case study, the VA analyst:
had been given permission to use the laptop at home.
had been expressly forbidden to remove the laptop from the premises.
was completely unaware that the laptop was stolen.
was a “black-hat†hacker searching for veterans†personal information.
10 points
QUESTION 12
The privacy information that was stolen in the VA data breach included names, as well as:
employment information such as employee ID numbers, titles, and salaries.
electronic health records and protected health information (PHI).
Social Security numbers, dates of birth, and disability ratings.
credit card, banking, and other financial information.
10 points
QUESTION 13
Which of the following statements is true regarding the difference between privacy and security?
There are no privacy laws currently in existence at the federal level.
Security is a necessary tool for building privacy while privacy is a basic human right.
Security only applies to information systems security requirements.
There is no difference between privacy and security.
10 points
QUESTION 14
Which of the following statements is true regarding calculating the costs of a crime like the one in the lab case study?
Calculating the consequences of a crime is relatively easy.
All of the costs are directly related to recovery from the crime.
There are costs associated with closing the vulnerabilities that allowed the crime to happen.
No costs are incurred after the crime has occurred.
10 points
QUESTION 15
In the PCWorld article you read in the lab, Representative Bob Filner called the VA†s response to the data theft:
“noble.â€
“inadequate.â€
“gross.â€
“pathetic.â€
10 points
QUESTION 16
The costs of a crime like the one in the lab case study:
are easily identified and quantifiable.
include only the money spent to fix the problem, appease those affected, and the estimated losses from downtime.
include only those costs that are directly related to the crime that occurred.
include costs that stem from situations that might or might not happen, such as identity theft and any resulting fraud.
10 points
QUESTION 17
The costs of the crime in the lab case study ranged from:
$100,000 to $200,000.
$100,000 to $1 million.
$1 million to $5 million.
$100 million to $500 million.
10 points
QUESTION 18
The data breach at the VA affected the records of approximately how many people?
1.4 million
5.3 million
15.7 million
26.5 million
10 points
QUESTION 19
Which of the following statements is true regarding the costs of a crime like the one in the lab case study?
Costs are far less justified before a disaster than after.
Management will be more than willing to spend funds to prevent all possible risks.
It is feasible to mitigate all identified risks, even the unforeseen ones, before they occur.
All closure happens prior to a risk presenting itself.
10 points
QUESTION 20
In the lab case study, the employee had permission from his supervisors to take the laptop home. Was he justified in taking home official data?
He was justified in taking home official data because removing veterans†privacy data was not specifically prohibited.
He was not justified in taking home official data because it was against agency policy definition to remove veterans†privacy data.
He was not justified in taking home official data because it was against information systems security requirements to remove veterans†privacy data.
He was not justified in taking home official data because it was against the organization†s security control systems to remove veterans†privacy data.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount! Use Discount Code “Newclient” for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
The post quiz questions 10 appeared first on The Nursing Hub.