Exam 2 Flashcards
What is a type of law that represents all that apply to a citizen (or subject) of a jurisdiction? (Single Choice) *
* criminal law
* private law
* civil law
* public law
- civil law
What is the type of law that addresses violations harmful to society and that is enforced by prosecution by the state? (Single Choice) *
* criminal law
* private law
* public law
* civil law
- criminal law
Which law regulates the role of the healthcare industry in protecting the privacy of individuals? (Single Choice) *
* Gramm-Leach-Bliley Act of 1999 (GLB or GLBA)
* Freedom of Information Act of 1966 (FOIA)
* Health Insurance Portability and Accountability Act of 1996 (HIPAA)
* Computer Fraud and Abuse Act of 1986 (CFAA)
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called which of the following?(Single Choice) *
* computer security law
* copyright law
* aggregate information
* data security standards
- copyright law
The cornerstone of many current federal computer-related criminal laws is the Computer Fraud and Abuse Act of 1986? (Single Choice) *
* True
* False
- True
Regardless of what information a company manages, it is shielded from local and state laws and regulations because the federal laws supersede them? (Single Choice) *
* True
* False
- False
Which of the following is an American contribution to an effort to improve copyright protection internationally? (Single Choice) *
* Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
* Digital Millennium Copyright Act (DMCA)
* Privacy and Electronic Communications Regulations of 2003
* Telecommunications Act of 1997
- Digital Millennium Copyright Act (DMCA)
Payment Card Industry ______ Standards are designed to enhance the security of customers’ payment card account data? (Single Choice) *
* data safety
* data security
* data practices
* account security
- data security
The ______ attempts to prevent trade secrets from being illegally shared?(Single Choice) *
* Electronic Communications Privacy Act
* Financial Services Modernization Act
* Sarbanes-Oxley Act
* Economic Espionage Act
- Economic Espionage Act
According to the National Information Infrastructure Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except? (Single Choice) *
* for purposes of commercial advantage
* for private financial gain
* to harass
* in furtherance of a criminal act
- to harass
The method by which systems determine whether and how to admit users into a trusted area of the organization is known as which of the following? (Single Choice) *
* attribute
* accountability
* access control
* auditability
- access control
Which term is used to describe the process of validating a supplicant’s purported identity? (Single Choice) *
* accountability
* authentication
* authorization
* biometrics
- authentication
The authentication factor “something a supplicant has” relies upon individual characteristics, such as fingerprints, palm prints, hand topography, hand geometry, or retina and iris scans? (Single Choice) *
* True
* False
- False
The biometric technology criteria that describes the number of legitimate users who are denied access because of a failure in the biometric device is known as which of the following? (Single Choice) *
* false reject rate
* false accept rate
* crossover error rate
* accountability rate
- false reject rate
What type of firewall examines every incoming packet header and can selectively filter packets based on header information, such as destination address, source address, packet type, and other key information? (Single Choice)*
* packet filtering
* proxy server
* media access control (MAC) layer
* application
- packet filtering
Which type of firewall filtering allows the firewall to react to an emergent event and update or create rules to deal with the event? (Single Choice) *
* static
* stable
* unstable
* dynamic
- dynamic