Gramm-leach-bliley act

Assignment Help Other Subject
Reference no: EM133903924

Questions 

1. Software license infringement is also often called software _____.

Blank 1

Blank 1

Add your answer

2. The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____.

Option A

ransoming

Option B

non-criminal fraud

Option C

identity theft

Option D

identity extortion

3. The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research.

True

False

4. According to the 1999 international study of computer-use ethics, many people from many cultural backgrounds indicated that unless an organization explicitly forbids _____ use of its computing resources, such use is acceptable

Blank 1

Blank 1

4. Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

Option A

Health Insurance Portability and Accountability Act

Option B

Computer Security Act

Option C

Financial Services Modernization Act

Option D

Communications Act

5. The Council of Europe Convention on Cybercrime has not been well received by advocates of intellectual property rights because it de-emphasizes prosecution for copyright infringement.

True

False

6. The Department of Homeland Security was created in 2003 by the 9/11 Memorial Act of 2002. _____

True

False

7. In 2001, the Council of Europe drafted the European Council Cybercrime Convention, which empowers an international task force to oversee a range of security functions associated with _____ activities.

Option A

online terrorist

Option B

cyberactivist

Option C

Internet

Option D

electronic commerce

8. A key difference between a policy and a law is that ignorance of a law is an acceptable defense.

True

False

9. The _____ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.

Blank 1

Blank 1

10. _____ is the legal obligation of an entity that extends beyond criminal or contract law.

Blank 1

Blank 1

11. In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____.

Option A

provide security awareness training

Option B

periodic assessment of risk

Option C

develop policies and procedures based on risk assessments

Option D

all of the other answers are correct

12. The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; maintains a secure Web site for communication about suspicious activity or intrusions; sponsors local chapter activities; and operates a help desk for questions. _____

True

False

13. _____ is a professional association that focuses on auditing, control, and security. The membership comprises both technical and managerial professionals.

Option A

SANS

Option B

ISACA

Option C

EC-Council

Option D

Information Systems Security Association (ISSA)

14. The communications networks of the United States carry(ies) more funds than all of the armored cars in the world combined. _____

True

False

15. Cultural differences can make it difficult to determine what is ethical and not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal.

True

False

16. The _____ attempts to prevent trade secrets from being illegally shared.

Option A

Electronic Communications Privacy Act

Option B

Sarbanes-Oxley Act

Option C

Financial Services Modernization Act

Option D

Economic Espionage Act

17. The _____ Act seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of corporate governance, in publicly traded companies.

Blank 1

Blank 1

18. What is the subject of the Computer Security Act of 1987?

Option A

Federal agency information security

Option B

Cryptography software vendors

Option C

All of the other answers are correct

Option D

Telecommunications common carriers

19. The _____ Act of 1996 attempts to prevent trade secrets from being illegally shared.

Blank 1

Blank 1

Add your answer

20. Ethics are the moral attitudes or customs of a particular group. _____

True

False

21. "Long arm _____" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems whenever it can establish jurisdiction.

Blank 1

Blank 1

22. The Computer _____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

Option A

Theft

Option B

Violence

Option C

Fraud

Option D

Usage

23. Intellectual privacy is recognized as a protected asset in the United States. _____

True

False

24. The _____ defines stiffer penalties for prosecution of terrorism-related activities.

Option A

Economic Espionage Act

Option B

Gramm-Leach-Bliley Act

Option C

Sarbanes-Oxley Act

Option D

USA PATRIOT Act

25. Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present?

Option A

All of the other answers are correct

Option B

Probability of being caught

Option C

Fear of penalty

Option D

Probability of penalty being administered

26. The _____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

Option A

Security and Freedom through Encryption Act

Option B

Prepper Act

Option C

Economic Espionage Act

Option D

USA PATRIOT Act

27. The Secret Service is charged with safeguarding the nation's financial infrastructure and payments systems to preserve the integrity of the economy.

True

False

28. The Digital Millennium Copyright Act is the American law created in response to Directive 95/46/EC, adopted in 1995 by the European Union. _____

True

False

29. The National Information Infrastructure Protection Act of 1996 modified which act?

Option A

USA PATRIOT Improvement and Reauthorization Act

Option B

Computer Fraud and Abuse Act

Option C

Computer Security Act

Option D

USA PATRIOT Act

30. The _____ Act of 1986 is a collection of statutes that regulates the interception of wire, electronic, and oral communications.

Blank 1

Blank 1

31. _____ are the fixed moral attitudes or customs of a particular group.

Blank 1

Blank 1

32.  The Graham-Leach-bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms. _____

True

False

Reference no: EM133903924

Questions Cloud

Determinations are arbitrary or capricious : Explain the two factors courts evaluate when considering whether an agency's actions or determinations are arbitrary or capricious.
Modern criminal justice agencies : Explain how you understand justice as defined by today's modern criminal justice agencies.
Dispute resolution procedures : Dispute Resolution Procedures. Acknowledgement of Dispute, External Mediation, Contact Information for External Bodies, Legal Remedies
Compare substantive justice and procedural justice : Compare substantive justice and procedural justice, including how procedural justice impacts wrongful convictions and moral perceptions of racial discrimination
Gramm-leach-bliley act : Which of the following acts is also widely known as the Gramm-Leach-Bliley Act? Software license infringement is also often called software _____.
Determine the enforceability of restrictive covenant : What factors determine the enforceability of a restrictive covenant? What is an indemnification?
Suing department of health for disclosing : Suing department of health for disclosing that you have prostate cancer as one of their employees a nurse passed the information also include vicarious liabilit
Incident took place at sunnyville high school involving : An incident took place at Sunnyville High School involving three high school students. Eighteen year-old senior Kayleigh Cyprus threw a cell phone
Analysis supported by the tax law : Organize your memo with headings that include Facts, Issues, Analysis Supported by the Tax Law, and Conclusions/Recommendations.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd