22
IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Embed Size (px)

Citation preview

Page 1: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

IPM THEORY CHALLENGEQUIZ NUMBER 3 Unit 3 Outcome 3

Page 2: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q1 – Which of the following is not one of the four Acts that influence the way organisations collect, store, and dispose of their data and information.

A. Health Records Act 2001B. Privacy Act 1988C. Information Privacy Act 2000 D. Copyright Act 1968

Page 3: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q2 – The Privacy Act 1988 affects which organisations

A. Private sector businessB. Commonwealth public sector

departments and agenciesC. Private sector business with an

annual turnover of > $3 millionD. Public sector in Victoria

Page 4: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q3 – The Health Records Act 2001 affects …

A. All Victorian organisations that deal with medical records

B. Victorian public sector organisations regardless of size

C. All Australian private and public sector organisations regardless of size

D. All of the above

Page 5: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q4 – The Privacy Amendment (Private Sector) Act 2000 affects …

A. All Australian organisations in the private sector regardless of size

B. Only those organisations dealing with sensitive health records

C. All Victorian organisations that deal with public information

D. Private sector organisation with an annual turnover of >$3 million

Page 6: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q5 – Which of the following is not a key feature of the Health Records Act 2001?

A. It covers both private and public medical sectors

B. It was designed to enable organisations to gain easy access to medical records when needed

C. Individuals can access their own medical information

D. Individuals are able to view their records to correct mistakes

Page 7: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q6 – Which of the following Acts deals with intellectual property

A. Health Records Act 2001B. Copyright Act 1968 C. Information Privacy Act 2000D. None of the above

Page 8: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q7 – Employers monitoring staff use of email would be considered a..

A. A breach of the Copyright Act 1968

B. An ethical workplace issueC. A breach of the Information

Privacy Act 2000 D. Good idea

Page 9: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q8 – Formatting a disk that contained important files would be considered

A. A physical threat to informationB. An ethical issue affecting

informationC. An accidental or deliberate threat

to informationD. An act that could get you sacked

Page 10: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q9 – Joe works for a company called ProAct. While at work he designs a database for the company to store information using Microsoft Access. Who owns the rights to this database?

A. JoeB. ProActC. The Copyright Act doesn’t cover

this situationD. Microsoft

Page 11: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q10 - Which of the following statements is incorrect?

A. Organisations must try to keep accurate, complete and up-to date information

B. Organisations cannot give out information to a third party without approval

C. Organisations must inform employees if they are under surveillance

D. Organisations are able to use information gathered for any purpose

Page 12: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q11 – Who of the following is allowed to access your medical records

A. Your boss to check if you are really sick

B. Any person working in the medical profession

C. YouD. Your parents as your legal

guardians

Page 13: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q12 – Hard disks are most useful for storing information online because

A. They are very fast and have high capacity

B. They will never crash if your careful

C. Everyone can access all the files when they want to

D. None of the above

Page 14: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q13 – Physical security includes

A. Locking doors and windowsB. Firewalls C. Desktop monitoring systems D. All of the above

Page 15: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q14 – Which of the following is not a biometric security device..

A. Fingerprint matchingB. A person’s iris patterns C. Smart cards D. Voice recognition

Page 16: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q15 – A criteria for evaluating the effectiveness of file management strategies is

A. Ease of retrievalB. The size of the fileC. Whether different programs can

read the file D. Whether the file extension is

visible in windows explorer or not

Page 17: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q16 – Which of the following is not a key area for evaluating file management strategies

A. Integrity of dataB. Folder and File sizesC. Ease of retrieval D. Security

Page 18: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q17 – Which of the following is not a software based security measure

A. Surveillance cameraB. Audit trail and monitoringC. Encryption D. Firewall

Page 19: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q18 – The difference between a differential backup and an incremental backup is ..

A. There is no real difference. The real difference is whether you do a full back up or not

B. Differential backups only partially back up your data

C. Incremental backups keep increasing the data storage

D. None of the above.

Page 20: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q19 – which of the following is not part of a disaster recovery plan ..

A. Emergency planB. Test planC. Backup planD. All of the above

Page 21: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

Q20 – The most popular software based barrier to prevent unauthorised access is

A. Antivirus softwareB. passwords C. Encyrption D. Surveillance cameras

Page 22: IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3

ANSWERS

1. D2. B3. A4. D5. B6. B7. B8. C9. B10. D

11. C12. A13. A14. C15. A16. B17. A18. D19. D20. B