Reference no: EM132273656
1. Sexual harassment applies to:
Only men who are being harassed.
Only women who are being harassed.
Either men or women who are being harassed.
Only attractive employees who are being harassed.
2. Policies and practices that leverage a variety of perspectives, life experiences, and approaches that every individual brings to the workplace, are referred to as diversity.
a. true
b. false
3. In the United States, immigrants are more likely than non-immigrants to start their own business, having been responsible for 30 percent of small business growth.
a. true
b. false
4. In a public key encryption scheme, which two types of keys do users have?
A. public key and protected key
B. private key and protected key
C. cipher key and coded key
D. public key and private key
5. Which password is the strongest for accessing the Microsoft website?
A. TwoHeads_MsfT
B. $2Habt1+MsfT
C. $2Habt1+AmZ
D. Micro2Habt1
E. $twoHeads
6. Which of the following is an example of social engineering?
A. a computer overwhelming a server with traffic
B. a program that secretly records your keystrokes
C. a hacker who steals a file containing passwords from your computer
D. a hacker who steals a file containing passwords from your computer
E. a phone call from someone in the IT department requesting your password
7. A _____________ is a centralized stockpile of data collected from across an enterprise.
A. data silo
B. data mine
C. data warehouse
D. data farm
8. When an individual initiates a conflict resolution using a collaborative style, the last step in responding to conflict resolution is to
create a new plan using the XYZ model.
provide alternative solutions.
have each party state his or her complaint using the XYZ model.
make an agreement for change.