SlideShare a Scribd company logo
Discussion: Shared Practice: The Triple Bottom Line
“Is the organization making a profit?” That is what most
stakeholders think about when they look at the bottom line. Yet,
an organization might be making a profit while dumping toxic
waste into the environment, treating employees poorly, or
failing to conserve resources. Nonfinancial performance
measures such as these can be challenging to measure. The
Triple Bottom Line (TBL) is a framework that incorporates
nonfinancial factors in measuring the performance of an
organization. In addition to assessing profitability, the TBL
approach also assesses an organization’s social and ecological
impact.
Today’s socially conscious executive thoroughly grasps the
significance of the TBL in terms of organizational and cultural
success. TBL, which is sometimes referred to as part of the
broader term corporate social responsibility (CSR), is a measure
of an organization’s financial health, environmental
sustainability, and its furtherance of social justice. One question
that can be used to assess if an organization is meeting TBL
objectives is whether or not the human experience of all
stakeholders is elevated due to its work.
To prepare for this Discussion, “Shared Practice: The Triple
Bottom Line,” review the Learning Resources for this week and
consider how the Triple Bottom Line is related to and affected
by an organization’s performance. Reflect on the meaning of
corporate social responsibility and how this might impact your
role in promoting social change.
Post by Day 3, the following:
•Predict how the implementation of the Triple Bottom Line
would affect your current or former organization’s performance.
Be sure to include at least two short term consequences and at
least two long term consequences of using the TBL
measurement system.
•Provide an explanation of how you view the relationship
between corporate profits and social responsibility.
•Describe how you (as an executive) plan to use some of the
skills learned in this course to promote social change in your
organization now and in the future.
Session 12: Final Exam
Print
Due December 19 at 12:00 AM
Starts Dec 12, 2016 12:00 AM
INFA 620 - NETWORK AND INTERNET SECURITY
Final Exam
This is an open-book individual exam. You may use any
resources in addition to the textbook, but you should do it
individually without collaborating with others. Questions should
be answered in your own words. Use quotation marks if not
using your own words, and do not forget to cite full reference.
Other Guidelines:
· You should submit your exam to your assignment folder in
WT as an HTML, MS-Word or plain text. When using HTML or
plain text, you can either use the window available to paste your
work, or attach your file.
· Repeat the text of the question you have selected.
· Be the clearest and objective you can in all questions and be
sure you are answering what is asked.
· Put your name in the exam.
The exam is due on Monday (12/19) 12:00 am.
PROBLEM 1 - Network Access Control (20 points)
(5 pts each)
a) Suppose you are a network administrator and are concerned
about unauthorized networked devices being plugged into your
system. You have read in your studies that legacy switch port
security is not effective and prefer to look into certificate
security. You are choosing between alternatives. Of the
following answers, which technology BEST solves the problem?
Explain.
A) 802.1X
B) Biometric Authentication for Devices (BAD)
C) VLAN Membership Policy Server (VMPS)
D) 802.11X
b) Which of the following are elements of the Separation of
Duties principle of operations security? (Choose two.) Explain.
A) Individuals rotate security-related duties so that no one
person is permanently responsible for a sensitive function.
B) Includes two-man and dual operator controls.
C) Operators maintain an arms-length relationship with security
controls.
D) Continuous retraining of personnel.
E) Ensures that no one person can compromise the whole
system.
c) What role does the policy server play in endpoint security?
Explain.
A) It retrieves security credentials directly from the endpoints.
B) It evaluates security credentials and makes an admission
control policy decision.
C) It enforces admission control policy decision.
D) All of the above
d) Where can NAC have the most impact on your compliance
efforts? Explain.
A) Authentication, access control and remediation
B) Policies, authentication and access control
C) Authentication, access control and audit
D) Policies, remediation and audit
PROBLEM 2 - IPSec and VPN (20 points)
(5 pts each)
a) Which of the following two terms are IPsec modes of
operation? Explain.
A) Transport and Tunnel Mode
B) Security Parameter and Security Associations
C) Authentication Header and Encapsulating Security Payloads
D) Authenticated and Tunnel Mode
b) Tunneling is a technique in which the IP datagram is first
_______ and then _______.
A) Encapsulated in another datagram; encrypted.
B) Encrypted; encapsulated in another datagram.
C) Authenticated; encrypted.
D) Encrypted; authenticated.
c) What is the relationship between a VPN and an extranet?
Explain.
A) Some extranets are VPNs; some VPNs are extranets.
B) Some extranets are VPNs; all VPNs are extranets.
C) VPNs and extranets are the same type of network.
D) VPNs are unrelated to extranets.
d) Which one is the best approach to VPNs? Explain.
A) VPN-specific gateway device.
B) Router-based.
C) Firewall-based.
D) Software only.
E) All of the above.
PROBLEM 3 - Firewalls (20 points)
(5 pts each)
a) Which is untrue of a packet filtering firewall? Explain.
A) High security.
B) Application independence.
C) Performance strength.
D) Excellent scalability.
b) Firewalls can be implemented in different ways. Consider a
dedicated firewall device. What is its major advantage when the
target is throughput and security? Explain.
A) The management console is easily installed.
B) The device contains proprietary operating systems.
C) The connection to the device is monitored by security
personnel.
D) A thorough packet inspection capability.
E) The hackers know most router-based firewall code.
c) Of the following choices, which one is a type of firewall
actively maintaining awareness of the status conversations
between internal and external hosts? Explain.
A) Stateful Firewall.
B) Non-Passive Firewall.
C) Active State Firewall.
D) Stateless Firewall.
E) None of the above
d) Which answer BEST describes a device that sits between
your users and the internet and rewrites source ports and source
IP Addresses and enhances your security posture? Explain.
A) Network Address Translator.
B) Web Proxy.
C) Web Firewall.
D) Host based firewall.
PROBLEM 4 - Wireless Network Security (20 points)
(5 pts each)
a) What is the protocol developed for the wireless network
communications? Explain.
A) Wireless Encryption Protocol (WEP)
B) Wireless Application Protocol (WAP)
C) Wired Equivalent Privacy (WEP)
D) Wireless Session Protocol (WSP)
b) Which of the following vulnerabilities is unique to 802.11
wireless LANs?
A) Forged deauthenticate frames
B) RF jamming
C) TCP SYN floods
D) Data sniffing
c) You are assisting a user implement a wireless network in his
home. The wireless hardware he has requires the RC4 protocol.
What type of security is BEST for this network? Explain.
A) WEP
B) WPA-TKIP
C) WPA-AES
D) WPA2 Enterprise
d) Which of the following is not a reason why WEP may be
considered vulnerable? Explain. (Select all that apply.)
A) Shared WEP keys among all clients
B) 20-bit initialization vector
C) An RC4 engine not properly initialized
D) 48-bit WEP keys
PROBLEM 5 - Web and Transport Layer Security (20 points)
(5 pts each)
a) In SSL/TLS protocol, what kind of authentication is
supported when you establish a secure session between a client
and a server?
A) Only server authentication (optional).
B) Server authentication (mandatory) and client authentication
(optional).
C) Role based authentication scheme.
D) Peer-to-peer authentication.
b) SSL is used to
A) Encrypt specific elements of data for application-specific
purposes.
B) Encrypt files located on a Web server.
C) Encrypt data as it travels over a network.
D) Encrypt digital certificates used to authenticate a Web site.
E) Encrypt passwords for storage in a database.
c) What kind of attacks does SSL prevent? Select the best
answer. Explain.
A) SQL Injection.
B) Sniffing.
C) Variable Manipulation.
D) Phishing Attacks.
d) Which of the following is the most common attack on DNS
servers? Explain.
A) Poisoning
B) Flood
C) Ping
D) Masquerading
TOTAL (1-5) 100 points

More Related Content

Similar to Discussion Shared Practice The Triple Bottom LineIs the o.docx

erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
mealsdeidre
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
Tomas Vileikis
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
View Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docxView Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docx
alehosickg3
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
tienboileau
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
PrescottLunt385
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
claric241
 
ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024
SkillCertProExams
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
chrysanthemu49
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
agathachristie266
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
agathachristie113
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
VSNaipaul15
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
KeatonJennings104
 

Similar to Discussion Shared Practice The Triple Bottom LineIs the o.docx (13)

erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
View Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docxView Attachment for all questions. All 21 Questions should be an.docx
View Attachment for all questions. All 21 Questions should be an.docx
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 
ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024ServiceNow CIS-Discovery Exam Dumps 2024
ServiceNow CIS-Discovery Exam Dumps 2024
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
 

More from elinoraudley582231

Assignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxAssignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docx
elinoraudley582231
 
Assignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxAssignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docx
elinoraudley582231
 
Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docx
elinoraudley582231
 
Assignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxAssignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docx
elinoraudley582231
 
Assignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxAssignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docx
elinoraudley582231
 
Assignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxAssignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docx
elinoraudley582231
 
Assignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxAssignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docx
elinoraudley582231
 
Assignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxAssignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docx
elinoraudley582231
 
Assignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxAssignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docx
elinoraudley582231
 
Assignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxAssignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docx
elinoraudley582231
 
Assignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxAssignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docx
elinoraudley582231
 
Assignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxAssignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docx
elinoraudley582231
 
Assignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxAssignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docx
elinoraudley582231
 
Assignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxAssignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docx
elinoraudley582231
 
Assignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxAssignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docx
elinoraudley582231
 
Assignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxAssignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docx
elinoraudley582231
 
Assignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxAssignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docx
elinoraudley582231
 
Assignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxAssignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docx
elinoraudley582231
 
Assignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxAssignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docx
elinoraudley582231
 
Assignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxAssignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docx
elinoraudley582231
 

More from elinoraudley582231 (20)

Assignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxAssignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docx
 
Assignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxAssignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docx
 
Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docx
 
Assignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxAssignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docx
 
Assignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxAssignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docx
 
Assignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxAssignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docx
 
Assignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxAssignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docx
 
Assignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxAssignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docx
 
Assignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxAssignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docx
 
Assignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxAssignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docx
 
Assignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxAssignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docx
 
Assignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxAssignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docx
 
Assignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxAssignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docx
 
Assignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxAssignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docx
 
Assignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxAssignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docx
 
Assignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxAssignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docx
 
Assignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxAssignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docx
 
Assignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxAssignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docx
 
Assignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxAssignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docx
 
Assignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxAssignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docx
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

Discussion Shared Practice The Triple Bottom LineIs the o.docx

  • 1. Discussion: Shared Practice: The Triple Bottom Line “Is the organization making a profit?” That is what most stakeholders think about when they look at the bottom line. Yet, an organization might be making a profit while dumping toxic waste into the environment, treating employees poorly, or failing to conserve resources. Nonfinancial performance measures such as these can be challenging to measure. The Triple Bottom Line (TBL) is a framework that incorporates nonfinancial factors in measuring the performance of an organization. In addition to assessing profitability, the TBL approach also assesses an organization’s social and ecological impact. Today’s socially conscious executive thoroughly grasps the significance of the TBL in terms of organizational and cultural success. TBL, which is sometimes referred to as part of the broader term corporate social responsibility (CSR), is a measure of an organization’s financial health, environmental sustainability, and its furtherance of social justice. One question that can be used to assess if an organization is meeting TBL objectives is whether or not the human experience of all stakeholders is elevated due to its work. To prepare for this Discussion, “Shared Practice: The Triple Bottom Line,” review the Learning Resources for this week and consider how the Triple Bottom Line is related to and affected by an organization’s performance. Reflect on the meaning of corporate social responsibility and how this might impact your role in promoting social change. Post by Day 3, the following: •Predict how the implementation of the Triple Bottom Line
  • 2. would affect your current or former organization’s performance. Be sure to include at least two short term consequences and at least two long term consequences of using the TBL measurement system. •Provide an explanation of how you view the relationship between corporate profits and social responsibility. •Describe how you (as an executive) plan to use some of the skills learned in this course to promote social change in your organization now and in the future. Session 12: Final Exam Print Due December 19 at 12:00 AM Starts Dec 12, 2016 12:00 AM INFA 620 - NETWORK AND INTERNET SECURITY Final Exam This is an open-book individual exam. You may use any resources in addition to the textbook, but you should do it individually without collaborating with others. Questions should be answered in your own words. Use quotation marks if not using your own words, and do not forget to cite full reference. Other Guidelines: · You should submit your exam to your assignment folder in WT as an HTML, MS-Word or plain text. When using HTML or plain text, you can either use the window available to paste your work, or attach your file. · Repeat the text of the question you have selected. · Be the clearest and objective you can in all questions and be sure you are answering what is asked. · Put your name in the exam. The exam is due on Monday (12/19) 12:00 am. PROBLEM 1 - Network Access Control (20 points)
  • 3. (5 pts each) a) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read in your studies that legacy switch port security is not effective and prefer to look into certificate security. You are choosing between alternatives. Of the following answers, which technology BEST solves the problem? Explain. A) 802.1X B) Biometric Authentication for Devices (BAD) C) VLAN Membership Policy Server (VMPS) D) 802.11X b) Which of the following are elements of the Separation of Duties principle of operations security? (Choose two.) Explain. A) Individuals rotate security-related duties so that no one person is permanently responsible for a sensitive function. B) Includes two-man and dual operator controls. C) Operators maintain an arms-length relationship with security controls. D) Continuous retraining of personnel. E) Ensures that no one person can compromise the whole system. c) What role does the policy server play in endpoint security? Explain. A) It retrieves security credentials directly from the endpoints. B) It evaluates security credentials and makes an admission control policy decision. C) It enforces admission control policy decision. D) All of the above d) Where can NAC have the most impact on your compliance efforts? Explain. A) Authentication, access control and remediation
  • 4. B) Policies, authentication and access control C) Authentication, access control and audit D) Policies, remediation and audit PROBLEM 2 - IPSec and VPN (20 points) (5 pts each) a) Which of the following two terms are IPsec modes of operation? Explain. A) Transport and Tunnel Mode B) Security Parameter and Security Associations C) Authentication Header and Encapsulating Security Payloads D) Authenticated and Tunnel Mode b) Tunneling is a technique in which the IP datagram is first _______ and then _______. A) Encapsulated in another datagram; encrypted. B) Encrypted; encapsulated in another datagram. C) Authenticated; encrypted. D) Encrypted; authenticated. c) What is the relationship between a VPN and an extranet? Explain. A) Some extranets are VPNs; some VPNs are extranets. B) Some extranets are VPNs; all VPNs are extranets. C) VPNs and extranets are the same type of network. D) VPNs are unrelated to extranets. d) Which one is the best approach to VPNs? Explain. A) VPN-specific gateway device. B) Router-based.
  • 5. C) Firewall-based. D) Software only. E) All of the above. PROBLEM 3 - Firewalls (20 points) (5 pts each) a) Which is untrue of a packet filtering firewall? Explain. A) High security. B) Application independence. C) Performance strength. D) Excellent scalability. b) Firewalls can be implemented in different ways. Consider a dedicated firewall device. What is its major advantage when the target is throughput and security? Explain. A) The management console is easily installed. B) The device contains proprietary operating systems. C) The connection to the device is monitored by security personnel. D) A thorough packet inspection capability. E) The hackers know most router-based firewall code. c) Of the following choices, which one is a type of firewall actively maintaining awareness of the status conversations between internal and external hosts? Explain. A) Stateful Firewall. B) Non-Passive Firewall. C) Active State Firewall. D) Stateless Firewall. E) None of the above
  • 6. d) Which answer BEST describes a device that sits between your users and the internet and rewrites source ports and source IP Addresses and enhances your security posture? Explain. A) Network Address Translator. B) Web Proxy. C) Web Firewall. D) Host based firewall. PROBLEM 4 - Wireless Network Security (20 points) (5 pts each) a) What is the protocol developed for the wireless network communications? Explain. A) Wireless Encryption Protocol (WEP) B) Wireless Application Protocol (WAP) C) Wired Equivalent Privacy (WEP) D) Wireless Session Protocol (WSP) b) Which of the following vulnerabilities is unique to 802.11 wireless LANs? A) Forged deauthenticate frames B) RF jamming C) TCP SYN floods D) Data sniffing c) You are assisting a user implement a wireless network in his home. The wireless hardware he has requires the RC4 protocol. What type of security is BEST for this network? Explain. A) WEP B) WPA-TKIP C) WPA-AES
  • 7. D) WPA2 Enterprise d) Which of the following is not a reason why WEP may be considered vulnerable? Explain. (Select all that apply.) A) Shared WEP keys among all clients B) 20-bit initialization vector C) An RC4 engine not properly initialized D) 48-bit WEP keys PROBLEM 5 - Web and Transport Layer Security (20 points) (5 pts each) a) In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session between a client and a server? A) Only server authentication (optional). B) Server authentication (mandatory) and client authentication (optional). C) Role based authentication scheme. D) Peer-to-peer authentication. b) SSL is used to A) Encrypt specific elements of data for application-specific purposes. B) Encrypt files located on a Web server. C) Encrypt data as it travels over a network. D) Encrypt digital certificates used to authenticate a Web site. E) Encrypt passwords for storage in a database. c) What kind of attacks does SSL prevent? Select the best answer. Explain.
  • 8. A) SQL Injection. B) Sniffing. C) Variable Manipulation. D) Phishing Attacks. d) Which of the following is the most common attack on DNS servers? Explain. A) Poisoning B) Flood C) Ping D) Masquerading TOTAL (1-5) 100 points