Reference no: EM133903924
Questions
1. Software license infringement is also often called software _____.
Blank 1
Blank 1
Add your answer
2. The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____.
Option A
ransoming
Option B
non-criminal fraud
Option C
identity theft
Option D
identity extortion
3. The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research.
True
False
4. According to the 1999 international study of computer-use ethics, many people from many cultural backgrounds indicated that unless an organization explicitly forbids _____ use of its computing resources, such use is acceptable
Blank 1
Blank 1
4. Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?
Option A
Health Insurance Portability and Accountability Act
Option B
Computer Security Act
Option C
Financial Services Modernization Act
Option D
Communications Act
5. The Council of Europe Convention on Cybercrime has not been well received by advocates of intellectual property rights because it de-emphasizes prosecution for copyright infringement.
True
False
6. The Department of Homeland Security was created in 2003 by the 9/11 Memorial Act of 2002. _____
True
False
7. In 2001, the Council of Europe drafted the European Council Cybercrime Convention, which empowers an international task force to oversee a range of security functions associated with _____ activities.
Option A
online terrorist
Option B
cyberactivist
Option C
Internet
Option D
electronic commerce
8. A key difference between a policy and a law is that ignorance of a law is an acceptable defense.
True
False
9. The _____ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.
Blank 1
Blank 1
10. _____ is the legal obligation of an entity that extends beyond criminal or contract law.
Blank 1
Blank 1
11. In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____.
Option A
provide security awareness training
Option B
periodic assessment of risk
Option C
develop policies and procedures based on risk assessments
Option D
all of the other answers are correct
12. The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; maintains a secure Web site for communication about suspicious activity or intrusions; sponsors local chapter activities; and operates a help desk for questions. _____
True
False
13. _____ is a professional association that focuses on auditing, control, and security. The membership comprises both technical and managerial professionals.
Option A
SANS
Option B
ISACA
Option C
EC-Council
Option D
Information Systems Security Association (ISSA)
14. The communications networks of the United States carry(ies) more funds than all of the armored cars in the world combined. _____
True
False
15. Cultural differences can make it difficult to determine what is ethical and not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal.
True
False
16. The _____ attempts to prevent trade secrets from being illegally shared.
Option A
Electronic Communications Privacy Act
Option B
Sarbanes-Oxley Act
Option C
Financial Services Modernization Act
Option D
Economic Espionage Act
17. The _____ Act seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of corporate governance, in publicly traded companies.
Blank 1
Blank 1
18. What is the subject of the Computer Security Act of 1987?
Option A
Federal agency information security
Option B
Cryptography software vendors
Option C
All of the other answers are correct
Option D
Telecommunications common carriers
19. The _____ Act of 1996 attempts to prevent trade secrets from being illegally shared.
Blank 1
Blank 1
Add your answer
20. Ethics are the moral attitudes or customs of a particular group. _____
True
False
21. "Long arm _____" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems whenever it can establish jurisdiction.
Blank 1
Blank 1
22. The Computer _____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.
Option A
Theft
Option B
Violence
Option C
Fraud
Option D
Usage
23. Intellectual privacy is recognized as a protected asset in the United States. _____
True
False
24. The _____ defines stiffer penalties for prosecution of terrorism-related activities.
Option A
Economic Espionage Act
Option B
Gramm-Leach-Bliley Act
Option C
Sarbanes-Oxley Act
Option D
USA PATRIOT Act
25. Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present?
Option A
All of the other answers are correct
Option B
Probability of being caught
Option C
Fear of penalty
Option D
Probability of penalty being administered
26. The _____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.
Option A
Security and Freedom through Encryption Act
Option B
Prepper Act
Option C
Economic Espionage Act
Option D
USA PATRIOT Act
27. The Secret Service is charged with safeguarding the nation's financial infrastructure and payments systems to preserve the integrity of the economy.
True
False
28. The Digital Millennium Copyright Act is the American law created in response to Directive 95/46/EC, adopted in 1995 by the European Union. _____
True
False
29. The National Information Infrastructure Protection Act of 1996 modified which act?
Option A
USA PATRIOT Improvement and Reauthorization Act
Option B
Computer Fraud and Abuse Act
Option C
Computer Security Act
Option D
USA PATRIOT Act
30. The _____ Act of 1986 is a collection of statutes that regulates the interception of wire, electronic, and oral communications.
Blank 1
Blank 1
31. _____ are the fixed moral attitudes or customs of a particular group.
Blank 1
Blank 1
32. The Graham-Leach-bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms. _____
True
False