FSU CIS 3250 FINAL

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/358

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

359 Terms

1
New cards

Employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against anticipated punishment

True

2
New cards

Which of the following statements best describes a reason why organizations pursue corporate social responsibility (CSR) goals and promote a work environment in which employees are encouraged to act ethically when making business decisions?

To gain the goodwill of the community

3
New cards

A clear, concise statement of an issue that needs to be addressed is known as which of the following?

problem statement

4
New cards

To extend to all people the same respect and consideration that you expect from them is considered which of the following character traits?

integrity

5
New cards

Which of the following terms best describes a habit that inclines people to do what is acceptable?

virtue

6
New cards

An organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.

False

7
New cards

In the business world, important decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.

True

8
New cards

A well-implemented ethics and compliance program and a strong ethical culture can lead to:

less pressure on employees to misbehave

9
New cards

Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?

code of ethics

10
New cards

The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.

True

11
New cards

Because an activity is defined as legal, the activity is also considered ethical

False

12
New cards

The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.

False

13
New cards

A code of ethics cannot gain company-wide acceptance unless it is fully endorsed by the organization's leadership and developed with which of the following?

employee participation

14
New cards

Increasingly, managers are including ethical conduct as part of an employee's performance appraisal.

True

15
New cards

A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making is known as which of the following?

code of ethics

16
New cards

The board of directors of an organization is normally responsible for day-to-day management and operations of the organization.

False

17
New cards

Ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the CEO.

True

18
New cards

Legal acts conform to what an individual believes to be the right thing to do.

False

19
New cards

Consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization-that it will behave in the future much as it has in the past.

True

20
New cards

During which step of the decision-making process should one be extremely careful not to make assumptions about the situation?

Develop problem statement

21
New cards

A discrepancy between employee's own values and an organization's action

fosters poor performance

22
New cards

In which step of the decision-making process should the decision makers consider laws, guidelines, policies, and principles that might apply to the decision?

choose alternative

23
New cards

Someone who stands to gain or lose, depending on how a situation is resolved is known as which of the following

stakeholder

24
New cards

Setting corporate social responsibility (CSR) goals encourages an organization to achieve higher moral and ethical standards

True

25
New cards

What term is used to describe a habit of unacceptable behavior?

Vice

26
New cards

The goodwill that is created by which of the following can make it easier for corporations to conduct their business?

CSR Activities

27
New cards

Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in

False

28
New cards

In the decision-making process of implementing the decision, what plan must be defined to explain to people how they will move from the old way of doing things to the new way?

transition

29
New cards

Which of the following positions provides an organization with vision and leadership in the area of business conduct?

corporate ethics officer

30
New cards

In an environment where employees are encouraged to do "whatever it takes" to get the job done, employees may feel pressure to act in which of the following ways?

unethically

31
New cards

The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong

True

32
New cards

Compliance means to be in conformance with a profession's core body of knowledge

False

33
New cards

While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.

True

34
New cards

There are many industry association certifications in a variety of IT-related subject areas

True

35
New cards

The internal audit department includes members of the board of directors who determine that the internal systems and controls of the organization are adequate and effective

False

36
New cards

When it comes to distinguishing between bribes and gifts, the perceptions of the donor and recipient almost always coincide

False

37
New cards

A breach of the duty of care is defined as a failure to conform to the code of ethics of a professional organization

False

38
New cards

Gifts come with no expectation of a future favor for the donor

True

39
New cards

Government licensing of IT workers is common within most of the states of the United States

False

40
New cards

Vendor certifications require passing a written exam, which usually contains multiple-choice questions because of legal concerns about whether other types of exams can be graded objectively

True

41
New cards

The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following?

bribe a foreign official

42
New cards

a vender certification:

may focus too narrowly on the technical details of the vendor's technology

43
New cards

Which of the following is an effort by an employee to attract attention to a negligent, illegal, and unethical abusive, or dangerous act by a company that threatens the public interest?

Whistle-blowing

44
New cards

The Foreign Corrupt Practices Act is a legally binding global treaty to fight bribery and corruption

False

45
New cards

There is potential conflict of interest when IT consultants or auditors recommend their own products and services or those of an affiliated vender or remedy a problem they have detected

True

46
New cards

To prove fraud in a court of law, prosecutors must demonstrate that:

the wrongdoer made a false representation of material fact

47
New cards

In 1972, which organization recommended that publicly held organizations establish audit committees?

Securities and Exchange Commission (SEC)

48
New cards

A hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy is known as which of the following?

firewall

49
New cards

Which of the following states the principles and core values that are essential to the work of a particular occupational group?

Professional code of ethics

50
New cards

The posting of thousands of State Department documents on the WikiLeaks Web site is an example of which of the following?

Inappropriate sharing of information

51
New cards

The United Nations Convention Against Corruption makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office

False

52
New cards

A spear phishing attach typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target

False

53
New cards

Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms

False

54
New cards

Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists?

USA Patriot Act

55
New cards

Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies

True

56
New cards

Computer forensics is such a new field that there is little training or certification processes avalible

False

57
New cards

Which term is defined as an exploit that takes place before the security community or software developer knowns about the vulnerability or has been able to repair it?

zero-day attack

58
New cards

Which of the following concepts recognizes that managers must be use their judgement to ensure that the control does not exceed the system's benefits or the risks involved?

reasonable assurance

59
New cards

The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?

cyberterrorism

60
New cards

A business policy that permits employees to use their own mobile devices to access company resources and applications is known as which of the following?

bring your own device (BYOD)

61
New cards

The most common computer security precaution taken by businesses is the installation of which of the following?

firewall

62
New cards

Which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely?

virtual private network

63
New cards

An antivirus software scans for a specific sequence of bytes that indicates the presence of a specific malware. This sequence of bytes is known as which of the following?

virus signature

64
New cards

Many organizations outsource their network security operations to a company that monitors, manages, and maintains computer and network security for them. This type of company is known as which of the following?

managed security service provider

65
New cards

Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?

security dashboard

66
New cards

Phishing frequently leads consumers to counterfeit websites designed to trick them into initiating a denial-of-service attack.

false

67
New cards

Even when preventative measures are implemented, no organization is completely secure from a determined computer attack.

true

68
New cards

Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.

false

69
New cards

A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

false

70
New cards

The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.

true

71
New cards

Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?

U.S. Computer Emergency Readiness Team

72
New cards

In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

exploit

73
New cards

Today's computer menace is much better organized and may be part of an organized group

True

74
New cards

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

patch

75
New cards

The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?

Phising

76
New cards

Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security

False

77
New cards

A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?

cybercriminal

78
New cards

What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?

Distributed Denial-Of-Service

79
New cards

Which of the following gets a rootkit installation started and can be easily activated by clocking on a link to malicious Web site in an email or openeing an infected PDF file?

Dropper code

80
New cards

Software and/or hardware that monitors system and network resources and activities, and notifies network security personnel when it identifies network traffic that attempts to circumvent the security measures of a networked computer environment is known as which of the following?

intrusion detection system

81
New cards

The Fifth Amendment regulates the collection of the content of wire and electronic communications

False

82
New cards

Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in particular file, by typing a specific series of keystrokes, or by a specific time or date?

Logic bomb

83
New cards

The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion

True

84
New cards

The cost of creating an email campaign for a product or service is typically more expensive and takes longer to conduct than a direct-mail campaign

False

85
New cards

It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs.

True

86
New cards

The U.S. has a single, overarching national data privacy policy.

False

87
New cards

Which act prohibits unauthorized access to stored wire and electronic communications, such as the contents of email inboxes, instant messages, message boards, and social networking sites?

Electronic Communications Privacy Act

88
New cards

Which act presumes that a student's records are private and not available to the public without the consent of the student?

Family Educational Rights and Privacy Act

89
New cards

In the context of tenets of The European Union Data Protection Directive, which of the following terms refers to an individual's right to seek legal relief through appropriate channels to protect privacy rights?

enforcement

90
New cards

Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.

False

91
New cards

Through the use of cookies, a Web site is able to identify visitors on subsequent visits.

True

92
New cards

Under the Right to Financial Privacy Act, a financial institution can release a customer's financial records without the customer's authorization as long as it is a government authority that is seeking the records.

False

93
New cards

The cost of a data breach can be quite expensive, by some estimates nearly $200 for each record lost.

True

94
New cards

The Children's Online Privacy Protection Act:

does not cover the dissemination of information to children

95
New cards

A pen register is a device that records the originating number of incoming calls for a particular phone number.

False

96
New cards

Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?

Gramm-Leach-Bliley Act

97
New cards

Which act allows consumers to request and obtain a free credit report each year from each of the three primary credit reporting companies?

Fair and Accurate Credit Transactions Act

98
New cards

Title I of which of the following acts extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet?

Electronic Communications Privacy Act

99
New cards

Under which act did the Federal Communications Commission respond to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps?

Communications Assistance for Law Enforcement Act

100
New cards

The rights assigned to parents by the Family Educational Rights and Privacy Act transfer to the student once the student reaches the age of 21.

False