SAC 33 Quiz

advertisement
IPM THEORY
CHALLENGE
QUIZ NUMBER 3 Unit 3 Outcome 3
Q1 – Which of the following is not one of the four
Acts that influence the way organisations collect,
store, and dispose of their data and information.
A.
B.
C.
D.
Health Records Act 2001
Privacy Act 1988
Information Privacy Act 2000
Copyright Act 1968
Q2 – The Privacy Act 1988 affects which
organisations
A. Private sector business
B. Commonwealth public sector
departments and agencies
C. Private sector business with an
annual turnover of > $3 million
D. Public sector in Victoria
Q3 – The Health Records Act 2001 affects …
A. All Victorian organisations that deal
with medical records
B. Victorian public sector organisations
regardless of size
C. All Australian private and public
sector organisations regardless of size
D. All of the above
Q4 – The Privacy Amendment (Private Sector) Act
2000 affects …
A. All Australian organisations in the
private sector regardless of size
B. Only those organisations dealing with
sensitive health records
C. All Victorian organisations that deal
with public information
D. Private sector organisation with an
annual turnover of >$3 million
Q5 – Which of the following is not a key feature of
the Health Records Act 2001?
A. It covers both private and public medical
sectors
B. It was designed to enable organisations to
gain easy access to medical records when
needed
C. Individuals can access their own medical
information
D. Individuals are able to view their records to
correct mistakes
Q6 – Which of the following Acts deals with
intellectual property
A.
B.
C.
D.
Health Records Act 2001
Copyright Act 1968
Information Privacy Act 2000
None of the above
Q7 – Employers monitoring staff use of email
would be considered a..
A. A breach of the Copyright Act 1968
B. An ethical workplace issue
C. A breach of the Information Privacy
Act 2000
D. Good idea
Q8 – Formatting a disk that contained important
files would be considered
A. A physical threat to information
B. An ethical issue affecting information
C. An accidental or deliberate threat to
information
D. An act that could get you sacked
Q9 – Joe works for a company called ProAct. While at work
he designs a database for the company to store
information using Microsoft Access. Who owns the
rights to this database?
A. Joe
B. ProAct
C. The Copyright Act doesn’t cover this
situation
D. Microsoft
Q10 - Which of the following statements is
incorrect?
A. Organisations must try to keep accurate,
complete and up-to date information
B. Organisations cannot give out information
to a third party without approval
C. Organisations must inform employees if
they are under surveillance
D. Organisations are able to use information
gathered for any purpose
Q11 – Who of the following is allowed to access
your medical records
A. Your boss to check if you are really
sick
B. Any person working in the medical
profession
C. You
D. Your parents as your legal guardians
Q12 – Hard disks are most useful for storing
information online because
A. They are very fast and have high
capacity
B. They will never crash if your careful
C. Everyone can access all the files
when they want to
D. None of the above
Q13 – Physical security includes
A.
B.
C.
D.
Locking doors and windows
Firewalls
Desktop monitoring systems
All of the above
Q14 – Which of the following is not a biometric security
device..
A.
B.
C.
D.
Fingerprint matching
A person’s iris patterns
Smart cards
Voice recognition
Q15 – A criteria for evaluating the effectiveness of
file management strategies is
A. Ease of retrieval
B. The size of the file
C. Whether different programs can read
the file
D. Whether the file extension is visible in
windows explorer or not
Q16 – Which of the following is not a key area for
evaluating file management strategies
A.
B.
C.
D.
Integrity of data
Folder and File sizes
Ease of retrieval
Security
Q17 – Which of the following is not a
software based security measure
A.
B.
C.
D.
Surveillance camera
Audit trail and monitoring
Encryption
Firewall
Q18 – The difference between a differential backup
and an incremental backup is ..
A. There is no real difference. The real
difference is whether you do a full
back up or not
B. Differential backups only partially
back up your data
C. Incremental backups keep increasing
the data storage
D. None of the above.
Q19 – which of the following is not part of a
disaster recovery plan ..
A.
B.
C.
D.
Emergency plan
Test plan
Backup plan
All of the above
Q20 – The most popular software based barrier to
prevent unauthorised access is
A.
B.
C.
D.
Antivirus software
passwords
Encyrption
Surveillance cameras
ANSWERS
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
D
B
A
D
B
B
B
C
B
D
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
C
A
A
C
A
B
A
D
D
B
Download