exam1+2 mcq quizlet

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/201

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

202 Terms

1
New cards

A survey by the Nielsen found that what percentage of the workforce accessed pornography from their workplace computer?

25%

2
New cards

The Foreign Intelligence Surveillance Act:

allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

3
New cards

Which act included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trails and encryption, and provides rights of access for patients?

American Recovery and Reinvestment Act/The Health Insurance Portability and Accountability Act (HIPAA)

4
New cards

Which of the following allows people to state their opinions without revealing their identity?

Anonymous expression

5
New cards

The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following?

bribe a foreign official

6
New cards

A business policy that permits employees to use their own mobile devices to access company resources and applications is known as which of the following?

bring your own device (BYOD)

7
New cards

Violation of which of the following acts can cause a school or public library to lose funding to help pay for its Internet connections?

Children's Internet Protection Act (CIPA)

8
New cards

Which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?

China

9
New cards

In which step of the decision-making process should the decision makers consider laws, guidelines, policies, and principles that might apply to the decision?

choose alternative

10
New cards

Which of the following statements is true of Children's Internet Protection Act (CIPA)?

CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.

11
New cards

Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?

code of ethics

12
New cards

A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making is known as which of the following?

code of ethics

13
New cards

Under which act did the Federal Communications Commission respond to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps?

Communications Assistance for Law Enforcement Act (CALEA)

14
New cards

Which of the following positions provides an organization with vision and leadership in the area of business conduct?

corporate ethics officer

15
New cards

The goodwill that is created by which of the following can make it easier for corporations to conduct their business?

CSR (Corporate Social Responsibility) Activities

16
New cards

A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?

cybercriminal

17
New cards

The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?

cyberterrorism

18
New cards

The Organization for Economic Co-operation and Development's requirement that personal data collected should be accurate, complete, current, and relevant to the purpose for which it is used is based on which principle?

Data Quality

19
New cards

During which step of the decision-making process should one be extremely careful not to make assumptions about the situation?

Develop problem statement

20
New cards

What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?

Distributed Denial-Of-Service

21
New cards

The Children's Online Privacy Protection Act:

does not cover the dissemination of information to children

22
New cards

Which of the following involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster?

Doxing

23
New cards

Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious website in an email or opening an infected PDF file?

Dropper code

24
New cards

Which of the following acts restricted the government's ability to intercept electronic communications such as email, fax, and text messages?

ECPA (Electronic Communications Privacy Act)

25
New cards

Which act prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites?

Electronic Communications Privacy Act

26
New cards

Title I of which of the following acts extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet?

Electronic Communications Privacy Act

27
New cards

A code of ethics cannot gain company-wide acceptance unless it is fully endorsed by the organization's leadership and developed with which of the following?

employee participation

28
New cards

In the context of tenets of The European Union Data Protection Directive, which of the following terms refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights?

enforcement

29
New cards

Which act bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries?

European Union Data Protection Directive

30
New cards

In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

exploit

31
New cards

Which act allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies?

Fair and Accurate Credit Transactions Act

32
New cards

Which act outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data, and how long data is retained?

Fair Credit Reporting Act

33
New cards

Which act presumes that a student's records are private and not available to the public without the consent of the student?

Family Educational Rights and Privacy Act

34
New cards

A hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy is known as which of the following?

firewall

35
New cards

The most common computer security precaution taken by businesses is the installation of which of the following?

firewall

36
New cards

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under which Amendment?

First

37
New cards

Possession of child pornography is a federal offense punishable by up to how many years in prison?

5-10 (10 is the max); 5 years in prison per image or file

38
New cards

In 2008, which act granted expanded authority to collect, without court-approved warrants, international communications as they flow through U.S. telecom network equipment and facilities?

Foreign Intelligence Surveillance Act Amendments Act

39
New cards

A discrepancy between an employee's own values and an organization's action

fosters poor performance

40
New cards

Which act protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees?

Fourth Amendment

41
New cards

Which act enables the public to gain access to certain government records?

Freedom of Information Act

42
New cards

Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?

Gramm-Leach-Bliley Act (GLBA)

43
New cards

Which of the following is an act that repealed a depression-era law known as Glass-Steagall?

Gramm-Leach-Bliley Act

44
New cards

The posting of thousands of State Department documents on the WikiLeaks website is an example of which of the following?

Inappropriate sharing of information

45
New cards

To extend to all people the same respect and consideration that you expect from them is considered which of the following character traits?

integrity

46
New cards

Software that can be installed with a web browser to block access to certain websites that contain inappropriate or offensive material is known as which of the following?

Internet Filter

47
New cards

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify which of the following?

Internet Filters

48
New cards

Proponents of the Children's Internet Protection Act (CIPA) argued that:

Internet filters are highly flexible and customizable.

49
New cards

Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?

intrusion detection system

50
New cards

Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?

A John Doe lawsuit

51
New cards

A well-implemented ethics and compliance program and a strong ethical culture can lead to:

less pressure on employees to misbehave

52
New cards

Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?

Logic bomb

53
New cards

Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?

managed security service provider

54
New cards

a vendor certification:

may focus too narrowly on the technical details of the vendor's technology

55
New cards

Which of the following is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment?

Miller v. California

56
New cards

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

patch

57
New cards

The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?

Phishing

58
New cards

Which act prohibits the government from concealing the existence of any personal data record-keeping systems?

Privacy Act

59
New cards

A clear, concise statement of an issue that needs to be addressed is known as which of the following?

problem statement

60
New cards

Which of the following states the principles and core values that are essential to the work of a particular occupational group?

Professional code of ethics

61
New cards

Although they may implement a speech code, which of the following entities are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint?

public schools and universities

62
New cards

Which of the following concepts recognizes that managers must use their judgment to ensure that the control does not exceed the system's benefits or the risks involved?

reasonable assurance

63
New cards

Which of the following can provide a virtually untraceable level of anonymity to email messages?

Remailers

64
New cards

In 1972, which organization recommended that publicly held organizations establish audit committees?

Securities and Exchange Commission (SEC)

65
New cards

Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?

security dashboard

66
New cards

An oral defamatory statement is called which of the following?

Slander

67
New cards

Someone who stands to gain or lose, depending on how a situation is resolved is known as which of the following?

stakeholder

68
New cards

Which act became law in 1996 with the purpose of allowing freer competition among phone, cable, and TV companies?

Telecommunications Act

69
New cards

Which of the following statements best describes a reason why organizations pursue corporate social responsibility (CSR) goals and promote a work environment in which employees are encouraged to act ethically when making business decisions?

To gain the goodwill of the community

70
New cards

In the decision-making process of implementing the decision, what plan must be defined to explain to people how they will move from the old way of doing things to the new way?

transition

71
New cards

In an environment where employees are encouraged to do "whatever it takes" to get the job done, employees may feel pressure to act in which of the following ways?

unethically

72
New cards

Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists?

USA Patriot Act

73
New cards

Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?

U.S. Computer Emergency Readiness Team (US-CERT)

74
New cards

What term is used to describe a habit of unacceptable behavior?

Vice

75
New cards

Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?

virtual private network

76
New cards

Which of the following terms best describes a habit that inclines people to do what is acceptable?

virtue

77
New cards

An antivirus software scans for a specific sequence of bytes that indicates the presence of a specific malware. This sequence of bytes is known as which of the following?

virus signature

78
New cards

Which of the following is an effort by an employee to attract attention to a negligent, illegal, and unethical abusive, or dangerous act by a company that threatens the public interest?

Whistle-blowing

79
New cards

In the context of the Fourth Amendment, the courts have ruled that:

without a reasonable expectation of privacy, there is no privacy right

80
New cards

To prove fraud in a court of law, prosecutors must demonstrate that:

the wrongdoer made a false representation of material fact

81
New cards

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?

zero-day attack

82
New cards

In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?

$5000

83
New cards

Global Market Research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?

2/3

84
New cards

The number of Internet users worldwide is quickly approaching which of the following?

4 Billion

85
New cards

The number of Internet users worldwide is quickly approaching which of the following?

4 Billion

86
New cards

Offshore demand is driving up salaries in India by roughly how much per year?

15%

87
New cards

As of March 2017, how many states had implemented the SORNA requirements of the Adam Walsh Act?

17

88
New cards

Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?

18 USC 2425

89
New cards

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.

25 Years

90
New cards

For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.

25 Years

91
New cards

Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?

45%

92
New cards

How many H-1B visas has Congress set as the maximum amount to be granted yearly?

65,000

93
New cards

Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?

400 Hours

94
New cards

In what year was the Digital Millennium Copyright Act (DMCA) signed into law?

1998

95
New cards

Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?

ACPA (Anticybersquatting Consumer Protection Act)

96
New cards

Which of the following established the minimum levels of protection that each country must provide to all WTO members?

Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)

97
New cards

Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers?

Artificial Intelligence

98
New cards

What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?

Black-Box Testing

99
New cards

If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for which of the following?

Breach of Warranty

100
New cards

A social networking platform:

Can be used for business purposes