cis3250 ch1-5

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in. T/F

False

2
New cards

Legal acts conform to what an individual believes to be the right thing to do. T/F

False

3
New cards

The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically. T/F

False

4
New cards

The countries with the highest software piracy rate in the world include Luxembourg, Japan, and New Zealand. T/F

False

5
New cards

In a nonprofit organization, the board of directors reports to the local community that it serves. T/F

True

6
New cards

Because an activity is defined as legal, the activity is also considered ethical. T/F

False

7
New cards

In a for-profit organization, the primary objective of which of the following is to oversee the organization's business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community?
negotiator
board of directors
corporate ethics officer
corporate compliance officer

board of directors

8
New cards

If the desired results are not achieved upon implementation of a solution, one should return to the "identify alternatives" step of the decision making process and rework the decision. T/F

False

9
New cards

The goodwill that is created by which of the following can make it easier for corporations to conduct their business?
profits
alliances
incentives
CSR activities

CSR activities

10
New cards

The piracy rate is nearly 80 percent across which continent?
Asia
North America
Europe
Africa

Africa

11
New cards

Laws can proclaim an act as legal, although many people may consider the act immoral. T/F

True

12
New cards

The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong. T/F

True

13
New cards

Which of the following statements best describes a reason why organizations pursue corporate social responsibility (CSR) goals and promote a work environment in which employees are encouraged to act ethically when making business decisions?
To enjoy higher employee turnover rates
To define a variable approach for dealing with stakeholders
To gain the goodwill of the community
To increase unfavorable publicity

To gain the goodwill of the community

14
New cards

The board of directors of an organization is normally responsible for day-to-day management and operations of the organization. T/F

False

15
New cards

The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs. T/F

True

16
New cards

Standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs is known as which of the following?
Ethics
Virtues
Laws
Morals

Ethics

17
New cards

Most people have developed a decision-making process they use almost automatically, without thinking about the steps they go through. T/F

True

18
New cards

Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?
mission statement
acceptable use policy
problem statement
code of ethics

code of ethics

19
New cards

Which of the following steps in the decision-making process gathers and analyzes facts and also identifies stakeholders affected by the decision?
Develop problem statement
Evaluate result
Identify alternatives
Implement decision

Develop problem statement

20
New cards

One's personal beliefs about right and wrong are known as which of the following?
virtues
vices
characteristics
morals

Morals

21
New cards

Which of the following states the principles and core values that are essential to the work of a particular occupational group?
work statement
mission statement
manual of style
professional code of ethics

professional code of ethics

22
New cards

One of the most common ethical problems for members of the IT profession when a potential employee lies on a resume and claims competence in an IT skill that is in high demand. This act is known as which of the following?
misrepresentation
fraud
resume inflation
breach of the duty of care

resume inflation

23
New cards

Professionals who breach the duty of care are liable for injuries that their negligence causes. This liability is commonly referred to as which of the following?
professional malpractice
breach of the duty of care
professional standard breach
software piracy

professional malpractice

24
New cards

Gifts come with no expectation of a future favor for the donor. T/F

True

25
New cards

A breach of the duty of care is defined as a failure to conform to the code of ethics of a professional organization. T/F

False

26
New cards

From a legal perspective, there is both a reasonable person standard and a reasonable professional standard to decide whether parties owe a duty of care. T/F

True

27
New cards

A bribe is a crime even if the payment was lawful under the laws of the foreign country in which it was paid. T/F

False

28
New cards

Vendor certifications require passing a written exam, which usually contains multiple-choice questions because of legal concerns about whether other types of exams can be graded objectively. T/F

True

29
New cards

Under what circumstance might a gift be considered a bribe?
When given as a gesture of friendship
The gift exchange is made directly from donor to recipient
The gift comes with no expectation of a future favor
When the gift has not been declared

When the gift has not been declared

30
New cards

Which term is used to describe the failure to act as a reasonable person would act?
professional malpractice
duty of care
unreasonable professional standard
breach of the duty of care

breach of the duty of care

31
New cards

The goal of the standards set by the Foreign Corrupt Practices Act (FCPA) is to prevent companies from:

creating relationships between IT workers and suppliers.
making facilitating payments for obtaining permits or licenses.
using slush funds or other means to disguise payments to officials.
providing misrepresentations of a material fact.

using slush funds or other means to disguise payments to officials.

32
New cards

Which entity is a computing society founded in 1947 with more than 97,000 student and professional members in more than 100 countries, and it publishes over 50 journals and 30 newsletters?

Institute of Electrical and Electronic Engineers Computer Society
Business Software Alliance
Association for Computing Machinery
Association of Information Technology Professionals

Association for Computing Machinery

33
New cards

The United Nations Convention Against Corruption makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office. T/F

False

34
New cards

While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators. T/F

True

35
New cards

Which of the following is defined as not doing something that a reasonable person would do or doing something that a reasonable person would not do?

professional malpractice
breach of the duty of care
negligence
software piracy

negligence

36
New cards

Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers. T/F

True

37
New cards

A hardware or software device that serves as a barrier between a company and the outside world and limits access to the company's network based on the organization's Internet usage policy is known as which of the following?

router
hub
bridge
firewall

firewall

38
New cards

The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following?

pay an official to perform some official function faster
make lawful payments to a foreign official
make facilitating payments
bribe a foreign official

bribe a foreign official

39
New cards

A vendor certification:

-has no effect on an IT worker's salary and career prospects.
-usually does not require the purchase of expensive training material and course instruction.
-may focus too narrowly on the technical details of the vendor's technology.
-requires vendors to pass lengthy essay exams.

may focus too narrowly on the technical details of the vendor's technology.

40
New cards

In malpractice lawsuits, many courts have ruled that IT workers are not liable for malpractice because they:

do not belong to a professional organization.
fail to breach a duty of care.
do not meet the legal definition of a professional.
are not certified.

do not meet the legal definition of a professional.

41
New cards

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?

virus
operating system
zombie
CAPTCHA

virus

42
New cards

Before the IT security group can begin an eradication effort, it must:

seek permission of the firm's legal counsel
collect and log all possible criminal evidence from the system
consider the potential for negative publicity
develop an estimate for the monetary damage caused

collect and log all possible criminal evidence from the system

43
New cards

Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well. T/F

True

44
New cards

Which type of attacker hacks computers or websites in an attempt to promote a political ideology?

Industrial spies
Hackers
Cyberterrorists
Hacktivists

Hacktivists

45
New cards

Even when preventive measures are implemented, no organization is completely secure from a determined computer attack. T/F

True

46
New cards

Trojan horse has become an umbrella term for many types of malicious code. T/F

False

47
New cards

Which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?

Spamdexing
Vishing
Smishing
Spear phishing

Spear phishing

48
New cards

Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?

competitive intelligence
reasonable assurance
separation of duties
risk assessment

reasonable assurance

49
New cards

Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?

firewall
security dashboard
intrusion detection software
proxy server software

security dashboard

50
New cards

Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?

denial-of-service attack
logic bomb
botnet
rootkit

logic bomb

51
New cards

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?

distributed denial-of-service attack
bot attack
CAPTCHA attack
logic bomb

bot attack

52
New cards

In computing, a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability is known as which of the following?

exploit
patch
firewall
security audit

exploit

53
New cards

Today's computer menace is much better organized and may be part of an organized group. T/F

True

54
New cards

Whenever possible, automated system rules should mirror an organization's written policies. T/F

True

55
New cards

It is not unusual for a security audit to reveal that too many people have access to critical data and that many people have capabilities beyond those needed to perform their jobs. T/F

True

56
New cards

Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker. T/F

True

57
New cards

Which of the following is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks?

Carnegie Mellon's Computer Response Team
U.S. Computer Emergency Readiness Team
The National Institute of Standards and Technology
The Science and Technology Directorate of Homeland Security

U.S. Computer Emergency Readiness Team

58
New cards

The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?

valid test results
correct system login ids
the correct date and time
sufficient memory for operations

valid test results

59
New cards

Computer forensics is such a new field that there is little training or certification processes available. T/F

False

60
New cards

Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?

logic bomb
DDoS attack
zero-day attack
rootkit

zero-day attack

61
New cards

In 2008, which act granted expanded authority to collect, without court-approved warrants, international communications as they flow through U.S. telecom network equipment and facilities?

USA PATRIOT Act
Foreign Intelligence Surveillance Act Amendments Act
Electronic Communications Privacy Act
Omnibus Crime Control and Safe Streets Act

Foreign Intelligence Surveillance Act Amendments Act

62
New cards

The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission. T/F

True

63
New cards

Which act included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trails and encryption, and provides rights of access for patients?

Foreign Intelligence Surveillance Act
American Recovery and Reinvestment Act
Gramm-Leach-Bliley Act
Electronic Communications Privacy Act

American Recovery and Reinvestment Act

64
New cards

Which act prohibits the government from concealing the existence of any personal data record-keeping systems?

Fair Information Practices Act
USA PATRIOT Act
Privacy Act
Freedom of Information Act

Privacy Act

65
New cards

Established in 1980, The Organisation for Economic Co-operation and Development's created which of the following, which are often held up as the model of ethical treatment of consumer data?

European Union Data Protection Directives
fair information practices
transborder data flow principles
BBB online data protection guidelines

fair information practices

66
New cards

Through the use of cookies, a Web site is able to identify visitors on subsequent visits. T/F

True

67
New cards

American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy. T/F

False

68
New cards

A pen register is a device that records the originating number of incoming calls for a particular phone number. T/F

False

69
New cards

The use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used. T/F

True

70
New cards

The Privacy Act of 1974 extends to the actions of the CIA, U.S. law enforcement agencies, and the private industry. T/F

False

71
New cards

In Doe v. Holder, the courts ruled that the NSL gag provision violates which of the following?

Fair Information Practices Act
USA PATRIOT Act
First Amendment
sunset provision

First Amendment

72
New cards

The Foreign Intelligence Surveillance Act:

-extends the protections offered under the Wiretap Act to electronic communications, such as email, fax, and messages sent over the Internet.
-was passed by Congress in 1994 and amended both the Wiretap Act and the Electronic Communications Privacy Act.
-requires any company doing business within the borders of the countries comprising the European Union to implement a set of privacy directives on the fair and appropriate use of information.
-allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

allows surveillance, without court order, within the United States for up to a year unless the "surveillance will acquire the contents of any communication to which a U.S. person is a party."

73
New cards

Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?

Fair Credit Reporting Act
Health Insurance Portability and Accountability Act
Gramm-Leach-Bliley Act
USA PATRIOT Act

Gramm-Leach-Bliley Act

74
New cards

A device that records the originating number of incoming calls for a particular phone number is known as which of the following?

trap and trace
pen register
intercom
phone switchboard

trap and trace

75
New cards

Electronically stored information includes any form of digital information stored on any form of electronic storage device. T/F

True

76
New cards

Under which act did the Federal Communications Commission respond to appeals from the Department of Justice by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps?

USA PATRIOT Act
Communications Assistance for Law Enforcement Act
Electronic Communications Privacy Act
Foreign Intelligence Surveillance Act

Communications Assistance for Law Enforcement Act

77
New cards

Which act outlines who may access a user's credit information, how users can find out what is in their file, how to dispute inaccurate data, and how long data is retained?

Gramm-Leach-Bliley Act
Fair Credit Reporting Act
Credit CARD Act
Federal Credit Union Act

Fair Credit Reporting Act

78
New cards

Which of the following is an act that repealed a depression-era law known as Glass-Steagall?

Fair Credit Reporting Act
Health Insurance Portability and Accountability Act
Gramm-Leach-Bliley Act
Electronic Communications Privacy Act

Gramm-Leach-Bliley Act

79
New cards

The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet. T/F

True

80
New cards

The USA PATRIOT Act grants citizens the right to access certain information and records of federal, state, and local governments upon request. T/F

False

81
New cards

In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under which Amendment?

First
Second
Fourth
Fifth

First

82
New cards

Which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?

United States
India
Japan
China

China

83
New cards

Which of the following is considered an absolute defense against a charge of defamation?

Libel
Slander
The First Amendment
Truth

Truth

84
New cards

The Supreme Court has held that obscene speech and which of the following are not protected by the First Amendment and may be forbidden by the government?

audition
defamation
declamation
demarcation

defamation

85
New cards

Which of the following terms is defined as the control or suppression of the publishing or accessing of information on the Internet?

Internet filtering
Anonymous expression
Internet censorship
Slander

Internet censorship

86
New cards

Most countries other than the United States do not provide constitutional protection for hate speech. T/F

True

87
New cards

Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify which of the following?

Internet filters
spams
compression
encryption

Internet filters

88
New cards

Violation of which of the following acts can cause a school or public library to lose funding to help pay for its Internet connections?

Child Online Protection Act (COPA)
Children's Internet Protection Act (CIPA)
Children's Online Privacy Protection Act (COPPA)
Communications Decency Act (CDA)

Children's Internet Protection Act (CIPA)

89
New cards

Which of the following involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster?

Remailing
Doxing
Slandering
Libeling

Doxing

90
New cards

Anti-SLAPP laws are designed to protect children from pornography. T/F

False

91
New cards

A strategic lawsuit against public participation (SLAPP) is typically without merit. T/F

True

92
New cards

In general, the closer an Internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will apply. T/F

True

93
New cards

Private schools may prohibit students, instructors, and other employees from engaging in offensive speech. T/F

True

94
New cards

Which act became law in 1996 with the purpose of allowing freer competition among phone, cable, and TV companies?

Telecommunications Act
Telecommunications Deregulation and Reform Act
Child Online Protection Act
Communications Opportunity, Promotion and Enhancement Bill

Telecommunications Act

95
New cards

When a U.S. citizen engages in an activity protected by the U.S. Constitution, even if the activity violates the criminal laws of another country, U.S. laws do not allow which of the following?

the person to be imprisoned
the person to be sued
the person to be extradited
the person to be judged

the person to be extradited

96
New cards

A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country. T/F

False

97
New cards

Despite the importance of which of the following in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights?

privacy
freedom
anonymity
rights

anonymity

98
New cards

Which of the following is the Supreme Court case that established a test to determine if material is obscene and therefore not protected by the First Amendment?

Miller v. Brown
Miller v. California
Miller v. Stern
Miller v. Texas

Miller v. California

99
New cards

The Fifth Amendment protects American's rights to freedom of religion and freedom of expression. T/F

False

100
New cards

A strategy employed by corporations, government officials, and others against citizens and community groups who oppose them on matters of public interest is known as which of the following?

A John Doe lawsuit
A SLAPP
Internet censorship
Anonymous expression

A SLAPP