IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Preview:

Citation preview

IPM THEORY CHALLENGEQUIZ NUMBER 3 Unit 3 Outcome 3

Q1 – Which of the following is not one of the four Acts that influence the way organisations collect, store, and dispose of their data and information.

A. Health Records Act 2001B. Privacy Act 1988C. Information Privacy Act 2000 D. Copyright Act 1968

Q2 – The Privacy Act 1988 affects which organisations

A. Private sector businessB. Commonwealth public sector

departments and agenciesC. Private sector business with an

annual turnover of > $3 millionD. Public sector in Victoria

Q3 – The Health Records Act 2001 affects …

A. All Victorian organisations that deal with medical records

B. Victorian public sector organisations regardless of size

C. All Australian private and public sector organisations regardless of size

D. All of the above

Q4 – The Privacy Amendment (Private Sector) Act 2000 affects …

A. All Australian organisations in the private sector regardless of size

B. Only those organisations dealing with sensitive health records

C. All Victorian organisations that deal with public information

D. Private sector organisation with an annual turnover of >$3 million

Q5 – Which of the following is not a key feature of the Health Records Act 2001?

A. It covers both private and public medical sectors

B. It was designed to enable organisations to gain easy access to medical records when needed

C. Individuals can access their own medical information

D. Individuals are able to view their records to correct mistakes

Q6 – Which of the following Acts deals with intellectual property

A. Health Records Act 2001B. Copyright Act 1968 C. Information Privacy Act 2000D. None of the above

Q7 – Employers monitoring staff use of email would be considered a..

A. A breach of the Copyright Act 1968

B. An ethical workplace issueC. A breach of the Information

Privacy Act 2000 D. Good idea

Q8 – Formatting a disk that contained important files would be considered

A. A physical threat to informationB. An ethical issue affecting

informationC. An accidental or deliberate threat

to informationD. An act that could get you sacked

Q9 – Joe works for a company called ProAct. While at work he designs a database for the company to store information using Microsoft Access. Who owns the rights to this database?

A. JoeB. ProActC. The Copyright Act doesn’t cover

this situationD. Microsoft

Q10 - Which of the following statements is incorrect?

A. Organisations must try to keep accurate, complete and up-to date information

B. Organisations cannot give out information to a third party without approval

C. Organisations must inform employees if they are under surveillance

D. Organisations are able to use information gathered for any purpose

Q11 – Who of the following is allowed to access your medical records

A. Your boss to check if you are really sick

B. Any person working in the medical profession

C. YouD. Your parents as your legal

guardians

Q12 – Hard disks are most useful for storing information online because

A. They are very fast and have high capacity

B. They will never crash if your careful

C. Everyone can access all the files when they want to

D. None of the above

Q13 – Physical security includes

A. Locking doors and windowsB. Firewalls C. Desktop monitoring systems D. All of the above

Q14 – Which of the following is not a biometric security device..

A. Fingerprint matchingB. A person’s iris patterns C. Smart cards D. Voice recognition

Q15 – A criteria for evaluating the effectiveness of file management strategies is

A. Ease of retrievalB. The size of the fileC. Whether different programs can

read the file D. Whether the file extension is

visible in windows explorer or not

Q16 – Which of the following is not a key area for evaluating file management strategies

A. Integrity of dataB. Folder and File sizesC. Ease of retrieval D. Security

Q17 – Which of the following is not a software based security measure

A. Surveillance cameraB. Audit trail and monitoringC. Encryption D. Firewall

Q18 – The difference between a differential backup and an incremental backup is ..

A. There is no real difference. The real difference is whether you do a full back up or not

B. Differential backups only partially back up your data

C. Incremental backups keep increasing the data storage

D. None of the above.

Q19 – which of the following is not part of a disaster recovery plan ..

A. Emergency planB. Test planC. Backup planD. All of the above

Q20 – The most popular software based barrier to prevent unauthorised access is

A. Antivirus softwareB. passwords C. Encyrption D. Surveillance cameras

ANSWERS

1. D2. B3. A4. D5. B6. B7. B8. C9. B10. D

11. C12. A13. A14. C15. A16. B17. A18. D19. D20. B

Recommended