1/201
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A survey by the Nielsen found that what percentage of the workforce accessed pornography from their workplace computer?
25%
The Foreign Intelligence Surveillance Act:
allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."
Which act included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trails and encryption, and provides rights of access for patients?
American Recovery and Reinvestment Act/The Health Insurance Portability and Accountability Act (HIPAA)
Which of the following allows people to state their opinions without revealing their identity?
Anonymous expression
The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following?
bribe a foreign official
A business policy that permits employees to use their own mobile devices to access company resources and applications is known as which of the following?
bring your own device (BYOD)
Violation of which of the following acts can cause a school or public library to lose funding to help pay for its Internet connections?
Children's Internet Protection Act (CIPA)
Which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?
China
In which step of the decision-making process should the decision makers consider laws, guidelines, policies, and principles that might apply to the decision?
choose alternative
Which of the following statements is true of Children's Internet Protection Act (CIPA)?
CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?
code of ethics
A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making is known as which of the following?
code of ethics
Under which act did the Federal Communications Commission respond to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps?
Communications Assistance for Law Enforcement Act (CALEA)
Which of the following positions provides an organization with vision and leadership in the area of business conduct?
corporate ethics officer
The goodwill that is created by which of the following can make it easier for corporations to conduct their business?
CSR (Corporate Social Responsibility) Activities
A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?
cybercriminal
The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?
cyberterrorism
The Organization for Economic Co-operation and Development's requirement that personal data collected should be accurate, complete, current, and relevant to the purpose for which it is used is based on which principle?
Data Quality
During which step of the decision-making process should one be extremely careful not to make assumptions about the situation?
Develop problem statement
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?
Distributed Denial-Of-Service
The Children's Online Privacy Protection Act:
does not cover the dissemination of information to children
Which of the following involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster?
Doxing
Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious website in an email or opening an infected PDF file?
Dropper code
Which of the following acts restricted the government's ability to intercept electronic communications such as email, fax, and text messages?
ECPA (Electronic Communications Privacy Act)
Which act prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites?
Electronic Communications Privacy Act
Title I of which of the following acts extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet?
Electronic Communications Privacy Act
A code of ethics cannot gain company-wide acceptance unless it is fully endorsed by the organization's leadership and developed with which of the following?
employee participation
In the context of tenets of The European Union Data Protection Directive, which of the following terms refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights?
enforcement
Which act bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries?
European Union Data Protection Directive
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
exploit
Which act allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies?
Fair and Accurate Credit Transactions Act
Which act outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data, and how long data is retained?
Fair Credit Reporting Act
Which act presumes that a student's records are private and not available to the public without the consent of the student?
Family Educational Rights and Privacy Act
A hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy is known as which of the following?
firewall
The most common computer security precaution taken by businesses is the installation of which of the following?
firewall
In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under which Amendment?
First
Possession of child pornography is a federal offense punishable by up to how many years in prison?
5-10 (10 is the max); 5 years in prison per image or file
In 2008, which act granted expanded authority to collect, without court-approved warrants, international communications as they flow through U.S. telecom network equipment and facilities?
Foreign Intelligence Surveillance Act Amendments Act
A discrepancy between an employee's own values and an organization's action
fosters poor performance
Which act protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees?
Fourth Amendment
Which act enables the public to gain access to certain government records?
Freedom of Information Act
Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?
Gramm-Leach-Bliley Act (GLBA)
Which of the following is an act that repealed a depression-era law known as Glass-Steagall?
Gramm-Leach-Bliley Act
The posting of thousands of State Department documents on the WikiLeaks website is an example of which of the following?
Inappropriate sharing of information
To extend to all people the same respect and consideration that you expect from them is considered which of the following character traits?
integrity
Software that can be installed with a web browser to block access to certain websites that contain inappropriate or offensive material is known as which of the following?
Internet Filter
Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify which of the following?
Internet Filters
Proponents of the Children's Internet Protection Act (CIPA) argued that:
Internet filters are highly flexible and customizable.
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?
intrusion detection system
Which of the following can be used against an anonymous defendant to reveal truths about the defendant's identity?
A John Doe lawsuit
A well-implemented ethics and compliance program and a strong ethical culture can lead to:
less pressure on employees to misbehave
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?
Logic bomb
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?
managed security service provider
a vendor certification:
may focus too narrowly on the technical details of the vendor's technology
Which of the following is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment?
Miller v. California
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?
patch
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?
Phishing
Which act prohibits the government from concealing the existence of any personal data record-keeping systems?
Privacy Act
A clear, concise statement of an issue that needs to be addressed is known as which of the following?
problem statement
Which of the following states the principles and core values that are essential to the work of a particular occupational group?
Professional code of ethics
Although they may implement a speech code, which of the following entities are legally considered agents of the government and therefore must follow the First Amendment's prohibition against speech restrictions based on content or viewpoint?
public schools and universities
Which of the following concepts recognizes that managers must use their judgment to ensure that the control does not exceed the system's benefits or the risks involved?
reasonable assurance
Which of the following can provide a virtually untraceable level of anonymity to email messages?
Remailers
In 1972, which organization recommended that publicly held organizations establish audit committees?
Securities and Exchange Commission (SEC)
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?
security dashboard
An oral defamatory statement is called which of the following?
Slander
Someone who stands to gain or lose, depending on how a situation is resolved is known as which of the following?
stakeholder
Which act became law in 1996 with the purpose of allowing freer competition among phone, cable, and TV companies?
Telecommunications Act
Which of the following statements best describes a reason why organizations pursue corporate social responsibility (CSR) goals and promote a work environment in which employees are encouraged to act ethically when making business decisions?
To gain the goodwill of the community
In the decision-making process of implementing the decision, what plan must be defined to explain to people how they will move from the old way of doing things to the new way?
transition
In an environment where employees are encouraged to do "whatever it takes" to get the job done, employees may feel pressure to act in which of the following ways?
unethically
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists?
USA Patriot Act
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?
U.S. Computer Emergency Readiness Team (US-CERT)
What term is used to describe a habit of unacceptable behavior?
Vice
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?
virtual private network
Which of the following terms best describes a habit that inclines people to do what is acceptable?
virtue
An antivirus software scans for a specific sequence of bytes that indicates the presence of a specific malware. This sequence of bytes is known as which of the following?
virus signature
Which of the following is an effort by an employee to attract attention to a negligent, illegal, and unethical abusive, or dangerous act by a company that threatens the public interest?
Whistle-blowing
In the context of the Fourth Amendment, the courts have ruled that:
without a reasonable expectation of privacy, there is no privacy right
To prove fraud in a court of law, prosecutors must demonstrate that:
the wrongdoer made a false representation of material fact
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
zero-day attack
In the context of development of safety critical systems, if an undesirable event has a ten percent probability of occurring and a potential cost of $50,000, then the risk can be calculated as which of the following?
$5000
Global Market Research company J.D. Power claims that how many consumers have used a company's social media channel for customer service?
2/3
The number of Internet users worldwide is quickly approaching which of the following?
4 Billion
The number of Internet users worldwide is quickly approaching which of the following?
4 Billion
Offshore demand is driving up salaries in India by roughly how much per year?
15%
As of March 2017, how many states had implemented the SORNA requirements of the Adam Walsh Act?
17
Which federal law protects children against online stalking by making it a federal crime to communicate with any person with the intent to solicit or entice a child into unlawful sexual activity?
18 USC 2425
For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.
25 Years
For a sex offender who is at Tier 2 of the Adam Walsh Act, how long do they need to remain registered.
25 Years
Almost every job has partial automation potential, and research suggests what percentage of human work activities could be automated using existing technology?
45%
How many H-1B visas has Congress set as the maximum amount to be granted yearly?
65,000
Approximately how much material is being uploaded to YouTube every minute making it difficult to review all material submitted for posting?
400 Hours
In what year was the Digital Millennium Copyright Act (DMCA) signed into law?
1998
Which act allows trademark owners to challenge foreign cybersquatters who might otherwise be beyond the jurisdiction of U.S. courts?
ACPA (Anticybersquatting Consumer Protection Act)
Which of the following established the minimum levels of protection that each country must provide to all WTO members?
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Advances in which of the following areas are fundamentally changing the way work gets done and have the potential to affect the tasks, roles, and responsibilities of most workers?
Artificial Intelligence
What form of testing involves viewing the software unit as a device that has expected input and output behaviors but whose internal workings are unknown?
Black-Box Testing
If the product fails to meet the terms of its written guarantee, the buyer or lessee can sue for which of the following?
Breach of Warranty
A social networking platform:
Can be used for business purposes