during which step of the decision-making process should one be extremely careful not to make assumptions about the situation?
develop problem statement
2
New cards
a mission statement is a clear, concise description of the issue that needs to be addressed
false
3
New cards
in the business world, important decisions are too often left to the technical experts: general business managers must assume greater responsibility for these decisions
true
4
New cards
a statement that highlighted an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making it known as
code of ethics
5
New cards
because an activity is defined as legal, the activity is also considered ethical
false
6
New cards
consistency means that shareholders, customers, suppliers, and the community know what they can expect of an organization that is will behave in the future much as it has in the past
true
7
New cards
employees may suppress their tendency to act in a manner that seems ethical to them and instead act in a manner that will protect them against antiquated punishment
true
8
New cards
ideally, the corporate ethics officer should be a well respected, senior-level manager who reports directly to the CEO
true
9
New cards
an organization's mission statement highlights its key ethical issues and identifies the overarching values and principles that are important to the organization and its decision among
false
10
New cards
companies that develop and maintain strong employee relations
enjoy lower turnover rates
11
New cards
which of the following actives describes when an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year
social audit
12
New cards
To extend to all people the same respect and consideration that you expect from them is considered which of the following character traits?
integrity
13
New cards
One's personal beliefs about right and wrong are known as which of the following?
morals
14
New cards
A discrepancy between employee's own values and an organization's actions:
fosters poor performance
15
New cards
the greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically
false
16
New cards
In a for-profit organization, the primary objective of which of the following is to oversee the organization's business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community?
board of directors
17
New cards
the term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong
true
18
New cards
Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?
code of ethics
19
New cards
multinational and global organizations must not represent a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in
false
20
New cards
legal acts conform to what an individual believes to be the right thing to do
false
21
New cards
what term refers to the obligation to protect people against any unreasonable harm or risk
duty of care
22
New cards
government licensing of IT workers is common within most of the states of the United States
false
23
New cards
which of the following is a trade group that is funded through dues based on members companies' software revenues and through settlements from companies that commit software piracy
Business Software Alliance (BSA)
24
New cards
vendor certifications require passing a written exam, which usually contains multiple-choice question because of legal concerns about whether other types of exams can be graded objectivity
true
25
New cards
Which term distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product?
IT user
26
New cards
Under what circumstance might a gift be considered a bribe?
when the gift has not been declared
27
New cards
The core body of knowledge for any profession outlines an agreed-upon code of ethics and practices for those who practice in that profession
false
28
New cards
software piracy in a corporate setting is rarely directly traceable to IT staff members
false
29
New cards
Which term is used to describe the failure to act as a reasonable person would act?
breach of the duty of care
30
New cards
the Business Software Alliance has a few dozen lawyers and investigator who prosecute only the the too or so most egregious cases of software piracy each year
false
31
New cards
One of the most common ethical problems for members of the IT profession when a potential employee lies on a resume and claims competence in an IT skill that is in high demand. This act is known as which of the following?
resume inflation
32
New cards
there are many industry association certifications in a variety of IT-related subject areas
true
33
New cards
at which level is licensing generally administered?
state
34
New cards
Which of the following is a trade group that represents the world's largest software and hardware manufacturers?
Business Software Alliance (BSA)
35
New cards
the internal audit department includes members of the board of directors who determine that the internal systems and controls of the organization are adequate and effective
false
36
New cards
the crime of obtaining goods, services, or property through deception or trickery is known as what?
fraud
37
New cards
penalties for violating the Foreign Corrupt Practices Act (FCPA) are severe-corporations face a fine of up to how much per violation?
20 million
38
New cards
To prove fraud in a court of law, prosecutors must demonstrate that:
the wrongdoer made a false representation of material fact.
39
New cards
The Foreign Corrupt Practices Act (FCPA) makes it a crime to do which of the following?
bribe a foreign official
40
New cards
Which of the following is defined as the misstatement or incomplete statement of a material fact?
misrepresentation
41
New cards
computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email
false
42
New cards
which of the following is a form of trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date
logic bomb
43
New cards
which type of exploit is defined as the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization?
spear phishing
44
New cards
which of the following enables remote users to securely access an organization's collection of computing and storage devices and share data remotely
virtual private network
45
New cards
a spear phishing attack typically employs a group of zombies to keep the target so busy responding to a stream of automated requests that legitimate users cannot access the target
false
46
New cards
what exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?
spam
47
New cards
which of the following concepts recognizes that managers must use their judgement to ensure that the cost of control does not exceed the system;'s benefits or the risks involved ?
reasonable assurance
48
New cards
which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
zero-day attack
49
New cards
discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary cost as well
true
50
New cards
installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security
false
51
New cards
after virus eradication, you can use a previous backup to restore an infected computer
false
52
New cards
what type of viruses have become common and easily created form of malware that are created using applications such as Visual Basic or VBScript?
Macro viruses
53
New cards
the fifth amendment regulates the collection of the content of wire and electronic communications
false
54
New cards
Trojan horse has become an umbrella term for many types of malicious code
false
55
New cards
whenever possible, automated system rules should mirror an organization's written policies
true
56
New cards
many organizations sue software to provide a comprehensive display of all key performance indications related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?
security dashboard
57
New cards
vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack
false
58
New cards
malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following
ransomware
59
New cards
a business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following
bring your own device (BYOD)
60
New cards
the intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following
cyberterrorism
61
New cards
the use of information technology in business requires balancing the needs of those who use the information that is collected against the rights and desires of the people whose information is being used
true
62
New cards
American citizens are protected by the Fourth Amendment even when there is no reasonable expectation of privacy.
false
63
New cards
a national Security Letter is subject to judicial review and oversight
false
64
New cards
which act bars the export of data to countries that do not have data privacy protection standards comparable to those of its member countries?
European Union Data Protection Directive
65
New cards
which act prohibits the government from concealing the existence of any personal data record-keeping systems?
privacy act
66
New cards
under the USA PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that the information is needed for an ongoing investigation
true
67
New cards
the Foreign Intelligence Surveillance Act describes procedures for the electronic surveillance of communications between foreign powers and the agents of foreign powers
true
68
New cards
which of the following acts gave sweeping new powers both to domestic law enforcement international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, email, medical, financial, and other records?
USA PATRIOT Act
69
New cards
which of the following acts restricted the government;'s ability to intercept electronic communications such as email, fax, and text messages?
ECPA
70
New cards
the U.S. has a single, overarching national data privacy policy
false
71
New cards
information privacy is the combination of communications privacy and data privacy
true
72
New cards
a device that records the originating number of incoming calls for a particular phone number is known as which of the following?
trap and trace
73
New cards
Through the use of cookies, a Web site is able to identify visitors on subsequent visits.
true
74
New cards
which act enables the public to gain access to certain government records?
Freedom of Information act
75
New cards
which of the following is an act that repealed a depression-era law known as Glass-Steagall?
Gramm-Leach-Bliley act
76
New cards
the Constitution does not contain the word privacy, but the Supreme Court has ruled that the concept of privacy is protected by the Bill of Rights
true
77
New cards
which act included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trials and encryption, and provides rights of access for patients?
American Recovery and Reinvestment Act
78
New cards
the Privacy Act of 1974 extends to the actions of the CIA, U.S. law enforcement agencies, and the private industry
false
79
New cards
which act protects citizens from unreasonable government searches and is often invoked to protect the privacy of government employees?
Fourth Amendment
80
New cards
Title I of which of the following act extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet?
Electronic Communications Privacy Act
81
New cards
which of the following allows people to state their opinions without revealing their identity?
anonymous expression
82
New cards
which of the following statements is true of Communication Decency Act (CDA)?
the problem with the CDA was its broad language and vague definition of "indecent," a standard that was left to individual communities to determine
83
New cards
messages whose primary purpose is to communicate information about a specific transaction are subject to the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act.
false
84
New cards
over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First Amendment
true
85
New cards
an oral defamatory statement is libel
false
86
New cards
a Strategic Lawsuit Against Public Participation (SLAPP) is typically without merit
true
87
New cards
the plaintiff in a strategic lawsuit against public participation (SLAPP) can present themselves to the court admitting that their intent is to censor their critics
false
88
New cards
the California State Court in Pre-paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to which of the following
subpoenas requesting the identity of anonymous Web posters
89
New cards
which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?
china
90
New cards
Anti-SLAPP laws are designed to protect children from pornography
false
91
New cards
the goal of the Child Online Protection Act (COPA) was to protect children from harmful material on the World Wide Web, however, it was ruled unconstitutional
true
92
New cards
which of the following can provide a virtually untraceable level of anonymity to email messages?
remailers
93
New cards
anonymity on the internet is practically guaranteed
false
94
New cards
if an employee sees a coworker viewing porn on workplace computer, that employee may be able to claim that the company has
created a hostile work environment
95
New cards
the Children's Internet Protection Act (CIPA) was an attempt to protect children from accessing pornography and other explicit material online
true
96
New cards
despite the importance of which of the following in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights?
anonymity
97
New cards
pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity laws
true
98
New cards
Anonymous policy expression played an important role in the early formation of the United States
true
99
New cards
with URL filtering, a particular URL or domain name is identified as an objectionable site and the user is not allowed access to it
true
100
New cards
which of the following involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster?