QUESTION 1

  1. According to the PCWorld article you read in the lab, the violation that occurred in the lab case study was that the:
    two VA supervisors were responsible for implementing appropriate information systems security.
    two VA supervisors were responsible for making external backup copies of the data.
    VA data analyst was not authorized to take VA privacy data home on a laptop computer and make an external backup copy of the data.
    the VA data analyst was not authorized to be a “whistleblower” about the incident.

10 points

QUESTION 2

  1. In the lab case study, the privacy data and privacy law rights of __________ were violated.
    VA employees
    VA management and executive officers
    U.S. citizens and military personnel
    IT administrative personnel

10 points

QUESTION 3

  1. Which organization in the U.S. federal government is responsible for performing audits on other U.S. federal government agencies?
    The U.S. Government Accountability Office (GAO)
    The Federal Bureau of Investigation (FBI)
    The Central Intelligence Agency (CIA)
    The National Security Agency (NSA)

10 points

QUESTION 4

  1. The PCWorld article you read in the lab revealed that the VA’s cybersecurity efforts were hampered by:
    lack of “know-how.”
    bureaucracy.
    political agendas.
    inadequate staffing.

10 points

QUESTION 5

  1. The loss of privacy data has implications:
    only for the individual(s) whose privacy data has been lost.
    only for the individual(s) responsible.
    only for the organization involved.
    for the individual(s) whose privacy data has been lost, as well as the individual(s) responsible and the organization involved.

10 points

QUESTION 6

  1. In the lab case study, the VA secretary reprimanded and demoted the VA data analyst’s two supervisors because they:
    took VA privacy data home on their laptop computers.
    failed to report the incident immediately to appropriate officials.
    did not take adequate information system security measures.
    made external backup copies of privacy data.

10 points

QUESTION 7

  1. Which of the following deals with the regulation of personal information about individuals which can be collected by governments and other public as well as private organizations and its storage and use?
    Privacy laws
    Agency policy
    Security acts
    Information systems security

10 points

QUESTION 8

  1. Who was the weakest link in the chain of security and protection of privacy data in the lab case study?
    The VA Inspector General
    The VA’s executive management
    The VA employee and the employee’s supervisors
    The House Veterans’ Affairs Committee

10 points

QUESTION 9

  1. According to the PCWorld article you read in the lab, which of the following was stated as an issue in the lab case study?
    The database was not encrypted.
    The VA’s decentralized management.
    The employee and supervisors were overworked.
    The VA’s computer equipment was unable to adequately protect the privacy data in the database.

10 points

QUESTION 10

  1. According to the PCWorld article you read in the lab, which of the following was reported by House Veterans’ Affairs Committee?
    The VA seemed to focus on agency-wide solutions rather than fixing individual medical centers.
    The VA was ineffective because it had a centralized management and no divisions.
    An annual cybersecurity review had given the VA a failing grade in four of the past five years.
    The VA’s internal controls in data security had been mostly adequate in recent years.

10 points

QUESTION 11

  1. In the lab case study, the VA analyst:
    had been given permission to use the laptop at home.
    had been expressly forbidden to remove the laptop from the premises.
    was completely unaware that the laptop was stolen.
    was a “black-hat” hacker searching for veterans’ personal information.

10 points

QUESTION 12

  1. The privacy information that was stolen in the VA data breach included names, as well as:
    employment information such as employee ID numbers, titles, and salaries.
    electronic health records and protected health information (PHI).
    Social Security numbers, dates of birth, and disability ratings.
    credit card, banking, and other financial information.

10 points

QUESTION 13

  1. Which of the following statements is true regarding the difference between privacy and security?
    There are no privacy laws currently in existence at the federal level.
    Security is a necessary tool for building privacy while privacy is a basic human right.
    Security only applies to information systems security requirements.
    There is no difference between privacy and security.

10 points

QUESTION 14

  1. Which of the following statements is true regarding calculating the costs of a crime like the one in the lab case study?
    Calculating the consequences of a crime is relatively easy.
    All of the costs are directly related to recovery from the crime.
    There are costs associated with closing the vulnerabilities that allowed the crime to happen.
    No costs are incurred after the crime has occurred.

10 points

QUESTION 15

  1. In the PCWorld article you read in the lab, Representative Bob Filner called the VA’s response to the data theft:
    “noble.”
    “inadequate.”
    “gross.”
    “pathetic.”

10 points

QUESTION 16

  1. The costs of a crime like the one in the lab case study:
    are easily identified and quantifiable.
    include only the money spent to fix the problem, appease those affected, and the estimated losses from downtime.
    include only those costs that are directly related to the crime that occurred.
    include costs that stem from situations that might or might not happen, such as identity theft and any resulting fraud.

10 points

QUESTION 17

  1. The costs of the crime in the lab case study ranged from:
    $100,000 to $200,000.
    $100,000 to $1 million.
    $1 million to $5 million.
    $100 million to $500 million.

10 points

QUESTION 18

  1. The data breach at the VA affected the records of approximately how many people?
    1.4 million
    5.3 million
    15.7 million
    26.5 million

10 points

QUESTION 19

  1. Which of the following statements is true regarding the costs of a crime like the one in the lab case study?
    Costs are far less justified before a disaster than after.
    Management will be more than willing to spend funds to prevent all possible risks.
    It is feasible to mitigate all identified risks, even the unforeseen ones, before they occur.
    All closure happens prior to a risk presenting itself.

10 points

QUESTION 20

  1. In the lab case study, the employee had permission from his supervisors to take the laptop home. Was he justified in taking home official data?
    He was justified in taking home official data because removing veterans’ privacy data was not specifically prohibited.
    He was not justified in taking home official data because it was against agency policy definition to remove veterans’ privacy data.
    He was not justified in taking home official data because it was against information systems security requirements to remove veterans’ privacy data.
    He was not justified in taking home official data because it was against the organization’s security control systems to remove veterans’ privacy data.
#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational