Send a link to your students to track their progress
151 Terms
1
New cards
Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment
True
2
New cards
Which of the following statements best describes a reason why organizations pursue corporate social responsibility (CSR) goals and promote a work environment in which employees are encouraged to act ethically when making business decisions?
To gain the goodwill of the community
3
New cards
A clear, concise statement of an issue that needs to be addressed is known as which of the following?
problem statement
4
New cards
To extend to all people the same respect and consideration that you expect from them is considered which of the following character traits?
integrity
5
New cards
Which of the following terms best describes a habit that inclines people to do what is acceptable?
virtue
6
New cards
An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
False
7
New cards
In the business world, important decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.
True
8
New cards
A well-implemented ethics and compliance program and a strong ethical culture can lead to:
less pressure on employees to misbehave
9
New cards
Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?
code of ethics
10
New cards
The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.
True
11
New cards
Because an activity is defined as legal, the activity is also considered ethical
False
12
New cards
The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.
False
13
New cards
A code of ethics cannot gain company-wide acceptance unless it is fully endorsed by the organization's leadership and developed with which of the following?
employee participation
14
New cards
Increasingly, managers are including ethical conduct as part of an employee's performance appraisal.
True
15
New cards
A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making is known as which of the following?
code of ethics
16
New cards
The board of directors of an organization is normally responsible for day-to-day management and operations of the organization.
False
17
New cards
Ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the CEO.
True
18
New cards
Legal acts conform to what an individual believes to be the right thing to do.
False
19
New cards
Consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization-that it will behave in the future much as it has in the past.
True
20
New cards
During which step of the decision-making process should one be extremely careful not to make assumptions about the situation?
Develop problem statement
21
New cards
A discrepancy between employee's own values and an organization's action
fosters poor performance
22
New cards
In which step of the decision-making process should the decision makers consider laws, guidelines, policies, and principles that might apply to the decision?
choose alternative
23
New cards
Someone who stands to gain or lose, depending on how a situation is resolved is known as which of the following
stakeholder
24
New cards
Setting corporate social responsibility (CSR) goals encourages an organization to achieve higher moral and ethical standards
True
25
New cards
What term is used to describe a habit of unacceptable behavior?
Vice
26
New cards
The goodwill that is created by which of the following can make it easier for corporations to conduct their business?
CSR Activities
27
New cards
Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in
False
28
New cards
In the decision-making process of implementing the decision, what plan must be defined to explain to people how they will move from the old way of doing things to the new way?
transition
29
New cards
Which of the following positions provides an organization with vision and leadership in the area of business conduct?
corporate ethics officer
30
New cards
In an environment where employees are encouraged to do "whatever it takes" to get the job done, employees may feel pressure to act in which of the following ways?
unethically
31
New cards
The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong
True
32
New cards
Compliance means to be in conformance with a profession's core body of knowledge
False
33
New cards
While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.
True
34
New cards
There are many industry association certifications in a variety of IT-related subject areas
True
35
New cards
The internal audit department includes members of the board of directors who determine that the internal systems and controls of the organization are adequate and effective
False
36
New cards
When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient almost always coincide
False
37
New cards
A breach of the duty of care is defined as a failure to conform to the code of ethics of a professional organization
False
38
New cards
Gifts come with no expectation of a future favor for the donor
True
39
New cards
Government licensing of IT workers is common within most of the states of the United States
False
40
New cards
Vendor certifications require passing a written exam, which usually contains multiple-choice questions because of legal concerns about whether other types of exams can be graded objectively
True
41
New cards
The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following?
bribe a foreign official
42
New cards
a vender certification:
may focus too narrowly on the technical details of the vendor's technology
43
New cards
Which of the following is an effort by an employee to attract attention to a negligent, illegal, and unethical abusive, or dangerous act by a company that threatens the public interest?
Whistle-blowing
44
New cards
The Foreign Corrupt Practices Act is a legally binding global treaty to fight bribery and corruption
False
45
New cards
There is potential conflict of interest when IT consultants or auditors recommend their own products and services or those of an affiliated vender or remedy a problem they have detected
True
46
New cards
To prove fraud in a court of law, prosecutors must demonstrate that:
the wrongdoer made a false representation of material fact
47
New cards
In 1972, which organization recommended that publicly held organizations establish audit committees?
Securities and Exchange Commission (SEC)
48
New cards
A hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy is known as which of the following?
firewall
49
New cards
Which of the following states the principles and core values that are essential to the work of a particular occupational group?
Professional code of ethics
50
New cards
The posting of thousands of State Department documents on the WikiLeaks Web site is an example of which of the following?
Inappropriate sharing of information
51
New cards
The United Nations Convention Against Corruption makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office
False
52
New cards
A spear phishing attach typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target
False
53
New cards
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms
False
54
New cards
Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists?
USA Patriot Act
55
New cards
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies
True
56
New cards
Computer forensics is such a new field that there is little training or certification processes avalible
False
57
New cards
Which term is defined as an exploit that takes place before the security community or software developer knowns about the vulnerability or has been able to repair it?
zero-day attack
58
New cards
Which of the following concepts recognizes that managers must be use their judgement to ensure that the control does not exceed the system's benefits or the risks involved?
reasonable assurance
59
New cards
The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?
cyberterrorism
60
New cards
A business policy that permits employees to use their own mobile devices to access company resources and applications is known as which of the following?
bring your own device (BYOD)
61
New cards
The most common computer security precaution taken by businesses is the installation of which of the following?
firewall
62
New cards
Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?
virtual private network
63
New cards
An antivirus software scans for a specific sequence of bytes that indicates the presence of a specific malware. This sequence of bytes is known as which of the following?
virus signature
64
New cards
Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?
managed security service provider
65
New cards
Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?
security dashboard
66
New cards
Phishing frequently leads consumers to counterfeit websites designed to trick them into initiating a denial-of-service attack.
false
67
New cards
Even when preventative measures are implemented, no organization is completely secure from a determined computer attack.
true
68
New cards
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.
false
69
New cards
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
false
70
New cards
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.
true
71
New cards
Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?
U.S. Computer Emergency Readiness Team
72
New cards
In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?
exploit
73
New cards
Today's computer menace is much better organized and may be part of an organized group
True
74
New cards
Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?
patch
75
New cards
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?
Phising
76
New cards
Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security
False
77
New cards
A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?
cybercriminal
78
New cards
What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?
Distributed Denial-Of-Service
79
New cards
Which of the following gets a rootkit installation started and can be easily activated by clocking on a link to malicious Web site in an email or openeing an infected PDF file?
Dropper code
80
New cards
Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?
intrusion detection system
81
New cards
The Fifth Amendment regulates the collection of the content of wire and electronic communications
False
82
New cards
Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in particular file, by typing a specific series of keystrokes, or by a specific time or date?
Logic bomb
83
New cards
The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion
True
84
New cards
The cost of creating an email campaign for a product or service is typically more expensive and takes longer to conduct than a direct-mail campaign
False
85
New cards
It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.
True
86
New cards
The U.S. has a single, overarching national data privacy policy.
False
87
New cards
Which act prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites?
Electronic Communications Privacy Act
88
New cards
Which act presumes that a student's records are private and not available to the public without the consent of the student?
Family Educational Rights and Privacy Act
89
New cards
In the context of tenets of The European Union Data Protection Directive, which of the following terms refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights?
enforcement
90
New cards
Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.
False
91
New cards
Through the use of cookies, a Web site is able to identify visitors on subsequent visits.
True
92
New cards
Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.
False
93
New cards
The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.
True
94
New cards
The Children's Online Privacy Protection Act:
does not cover the dissemination of information to children
95
New cards
A pen register is a device that records the originating number of incoming calls for a particular phone number.
False
96
New cards
Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?
Gramm-Leach-Bliley Act
97
New cards
Which act allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies?
Fair and Accurate Credit Transactions Act
98
New cards
Title I of which of the following acts extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet?
Electronic Communications Privacy Act
99
New cards
Under which act did the Federal Communications Commission respond to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps?
Communications Assistance for Law Enforcement Act
100
New cards
The rights assigned to parents by the Family Educational Rights and Privacy Act transfer to the student once the student reaches the age of 21.