The term morals refers to the personal principles upon which an individual bases his or her decisions about what is right and what is wrong.
True
2
New cards
The goodwill that is created by which of the following can make it easier for corporations to conduct their business?
CSR Activities
3
New cards
What term is used to describe a habit of unacceptable behavior?
Vice
4
New cards
A set of beliefs about right and wrong behavior within a society is known as which of the following?
Ethics
5
New cards
Which of the following helps ensure that employees abide by the law, follow necessary regulations, and behave in an ethical manner?
Code of ethics
6
New cards
During which step of the decision-making process should one be extremely careful not to make assumptions about the situation?
Develop problem statement
7
New cards
A well-implemented ethics and compliance program and a strong ethical culture can lead to:
Less pressure on employees to misbehave
8
New cards
Fairness and generosity are examples of virtues.
True
9
New cards
Which of the following activities describes when an organization reviews how well it is meeting its ethical and social responsibility goals, and communicates its new goals for the upcoming year?
Social Audit
10
New cards
The term ethics describes standards or codes of behavior expected of an individual by a group to which the individual belongs.
True
11
New cards
The greater reliance of information systems in all aspects of life has decreased the risk that information technology will be used unethically.
False
12
New cards
Setting corporate social responsibility (CSR) goals encourages an organization to achieve higher moral and ethical standards.
True
13
New cards
In which step of the decision-making process should the decision makers consider laws, guidelines, policies, and principles that might apply to the decision?
Choose Alternative
14
New cards
A rapid increase in the appointment of corporate ethics officers typically follows:
The revelation of a major business scandal
15
New cards
Lawrence Kohlberg found that the most crucial factor that stimulates a person's moral development is monetary reward for good behavior.
False
16
New cards
Multinational and global organizations must not present a consistent face to their shareholders, customers, and suppliers but instead must operate with a different value system in each country they do business in.
False
17
New cards
A mission statement is a clear, concise description of the issue that needs to be addressed.
False
18
New cards
In the decision-making process of implementing the decision, what plan must be defined to explain to people how they will move from the old way of doing things to the new way?
Transition
19
New cards
The countries with the highest software piracy rate in the world include Luxembourg, Japan, and New Zealand.
False
20
New cards
In the business world, important decisions are too often left to the technical experts; general business managers must assume greater responsibility for these decisions.
True
21
New cards
The posting of thousands of State Department documents on the WikiLeaks Web site is an example of which of the following?
inappropriate sharing of information
22
New cards
The crime of obtaining goods, services, or property through deception or trickery is known as which of the following?
Fraud
23
New cards
Which of the following is defined as not doing something that a reasonable person would do or doing something that a reasonable person would not do?
negligence
24
New cards
A bribe is a crime even if the payment was lawful under the laws of the foreign country in which it was paid.
False
25
New cards
A trade secret is information, generally unknown to the public, that a company has taken strong measures to keep confidential.
True
26
New cards
The Business Software Alliance (BSA) has a few dozen lawyers and investigators who prosecute only the 100 or so most egregious cases of software piracy each year.
False
27
New cards
While no policy can stop wrongdoers, it can establish boundaries for acceptable and unacceptable behavior and enable management to punish violators.
True
28
New cards
To qualify legally as a bribe, the gift or payment must be made directly from donor to recipient.
False
29
New cards
To prove fraud in a court of law, prosecutors must demonstrate that:
the wrongdoer made a false representation of material fact.
30
New cards
Currently no one IT professional organization has emerged as preeminent, so there is no universal code of ethics for IT workers.
True
31
New cards
Laws provide a complete guide to ethical behavior.
False
32
New cards
There are many industry association certifications in a variety of IT-related subject areas.
True
33
New cards
What term refers to the obligation to protect people against any unreasonable harm or risk?
Duty of Care
34
New cards
Which of the following states the principles and core values that are essential to the work of a particular occupational group?
Professional code of ethics
35
New cards
A vendor certification:
may focus too narrowly on the technical details of the vendor's technology.
36
New cards
A survey by the Fawcett Society on the use of computing resources at work found that:
20 percent of men admit to viewing porn while at work
37
New cards
Which entity is a computing society founded in 1947 with more than 97,000 student and professional members in more than 100 countries, and it publishes over 50 journals and 30 newsletters?
Association for Computing Machinery
38
New cards
Which of the following is true about certification?
It can be applied to products.
39
New cards
Government licensing is generally administered at the federal level in the United States.
False
40
New cards
Professionals who breach the duty of care are liable for injuries that their negligence causes. This liability is commonly referred to as which of the following?
professional malpractice
41
New cards
Trojan horse has become an umbrella term for many types of malicious code.
False
42
New cards
Discussing security attacks through public trials and the associated publicity has not only enormous potential costs in public relations but real monetary costs as well.
True
43
New cards
Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?
reasonable assurance
44
New cards
Before the IT security group can begin an eradication effort, it must:
collect and log all possible criminal evidence from the system
45
New cards
After virus eradication, you can use a previous backup to restore an infected computer.
False
46
New cards
Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?
ransomware
47
New cards
The most common computer security precaution taken by businesses is the installation of which of the following?
firewall
48
New cards
Cyberterrorism involves the deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.
False
49
New cards
A network attack in which an intruder gains access to a network and stays there, undetected, with the intention of stealing data over a long period of time is known as which of the following?
APT
50
New cards
A router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
False
51
New cards
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies.
True
52
New cards
A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?
Bring your own device (BYOD)
53
New cards
Computer viruses differ from worms in that viruses can propagate without human intervention, often sending copies of themselves to other computers by email.
False
54
New cards
The Fifth Amendment regulates the collection of the content of wire and electronic communications.
False
55
New cards
What exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?
Spam
56
New cards
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner is known as which of the following?
virus
57
New cards
The act of fraudulently using email to try to get the recipient to reveal personal data is known as which of the following?
Phishing
58
New cards
Whenever possible, automated system rules should mirror an organization's written policies.
True
59
New cards
Ransomware is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
True
60
New cards
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnerability or has been able to repair it?
zero-day attack
61
New cards
Electronically stored information includes any form of digital information stored on any form of electronic storage device.
True
62
New cards
Established in 1980, The Organisation for Economic Co-operation and Development's created which of the following, which are often held up as the model of ethical treatment of consumer data?
fair information practices
63
New cards
A vehicle event data recorder (EDR) is a device that records vehicle and occupant data for a few seconds before, during, and after any vehicle crash that is severe enough to deploy the vehicle's air bags.
True
64
New cards
Which of the following rules requires each financial institution to document a data security plan describing the company's preparation and plans for the ongoing protection of clients' personal data?
Safeguards Rule
65
New cards
Online marketers can capture personal information, such as names, addresses, and Social Security numbers without requiring consent.
False
66
New cards
In the context of tenets of the European Union Data Protection Directive, which of the following terms refers to an individual's right to challenge the accuracy of the data and provide the corrected data?
correction
67
New cards
0.5 / 0.5 pts In 2008, which act granted expanded authority to collect, without court-approved warrants, international communications as they flow through U.S. telecom network equipment and facilities?
The Privacy Act of 1974 extends to the actions of the CIA, U.S. law enforcement agencies, and the private industry.
False
69
New cards
A pen register is a device that records the originating number of incoming calls for a particular phone number.
False
70
New cards
Discovery is part of the pretrial phase of a lawsuit in which each party can obtain which of the following from the other party by various means?
Evidence
71
New cards
The Health Insurance Portability and Accountability Act requires healthcare providers to obtain which of the following from patients prior to disclosing any information in their medical records?
written consent
72
New cards
Which act included strong privacy provisions for electronic health records and bans the sale of health information, promotes the use of audit trails and encryption, and provides rights of access for patients?
American Recovery and Reinvestment Act
73
New cards
Under the USA PATRIOT Act, the FBI can issue a National Security Letter to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that the information is needed for an ongoing investigation.
True
74
New cards
The Health Insurance Portability and Accountability Act requires healthcare organizations to employ standardized electronic transactions, codes, and identifiers to enable them to fully digitize medical records thus making it possible to exchange medical records over the Internet.
True
75
New cards
The U.S. has a single, overarching national data privacy policy.
False
76
New cards
The USA PATRIOT Act grants citizens the right to access certain information and records of federal, state, and local governments upon request.
False
77
New cards
The Gramm-Leach-Bliley Act includes three key rules that affect personal privacy: financial privacy rule, safeguards rule, and pretexting rule.
True
78
New cards
Which act enables the public to gain access to certain government records?
Freedom of Information Act
79
New cards
Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected?
Gramm-Leach-Bliley Act
80
New cards
The use of cookies and tracking software is controversial because companies can collect information about consumers without their explicit permission.
True
81
New cards
Each violation of the provisions of the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act can result in a fine of up to $250 for each unsolicited email, and fines can be tripled in certain cases.
True
82
New cards
Proponents of the Children's Internet Protection Act (CIPA) contended that shielding children from drugs, hate, pornography, and other topics is a sufficient reason to justify which of the following?
Internet filters
83
New cards
A U.S. citizen who posts material on the Web that is illegal in a foreign country cannot be prosecuted in that country.
False
84
New cards
Which of the following involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster?
Doxing
85
New cards
Which country has the largest online population in the world and also perhaps the most rigorous Internet censorship?
China
86
New cards
Section 230 of which act provides immunity to an Internet service provider (ISP) that publishes user-generated content, as long as its actions do not rise to the level of a content provider?
Communications Decency Act
87
New cards
Which of the following is considered an absolute defense against a charge of defamation?
Truth
88
New cards
Despite the importance of which of the following in early America, it took nearly 200 years for the Supreme Court to render rulings that addressed it as an aspect of the Bill of Rights?
anonymity
89
New cards
Over the years, a number of federal, state, and local laws have been found unconstitutional because they violated one of the tenets of the First amendment.
True
90
New cards
The plaintiff in a strategic lawsuit against public participation (SLAPP) can present themselves to the court admitting that their intent is to censor their critics.
False
91
New cards
Proponents of the Children's Internet Protection Act (CIPA) argued that:
Internet filters are highly flexible and customizable.
92
New cards
Anti-SLAPP laws are designed to protect children from pornography.
False
93
New cards
Violation of which of the following acts can cause a school or public library to lose funding to help pay for its Internet connections?
Children's Internet Protection Act (CIPA)
94
New cards
In general, the closer an Internet service provider (ISP) is to a pure service provider than to a content provider, the more likely that the Section 230 immunity of the Communications Decency Act (CDA) will apply.
True
95
New cards
Which of the following statements is true of Children's Internet Protection Act (CIPA)?
CIPA requires federally financed schools to use some form of technological protection to block computer access to obscene material.
96
New cards
In the United States, speech that is merely annoying, critical, demeaning, or offensive enjoys protection under which Amendment?
First
97
New cards
With dynamic content filtering, each Web site's content is evaluated immediately before it is displayed, using techniques such as object analysis and image recognition.
True
98
New cards
The Children's Internet Protection Act (CIPA) was an attempt to protect children from accessing pornography and other explicit material online.
True
99
New cards
The California State Court in Pre-Paid Legal v. Sturtz et al. set a legal precedent that refined the criteria courts apply to which of the following?
subpoenas requesting the identity of anonymous Web posters
100
New cards
The Supreme Court has held that obscene speech and which of the following are not protected by the First Amendment and may be forbidden by the government?