FINAL TEST EXAM Flashcards

SKILL

1
Q

t a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office. The act applies to any U.S. citizen or company and to any company with shares listed on any U.S. stock exchange.

A

FORIEGN CORRUPTION PRACTICE ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TWO REASONS FOR VENDOR CERTIFICATION

A

SALARY
INCREASED HIRING DEMAND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

people are often aggressive in striving for what they want and are used to having privileged access to information, people, and other resources. Furthermore, their success often inflates their belief that they have the ability and the right to manipulate the outcome of any situation

A

CORRUPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately has been given the name

A

Bathsheba syndrome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of sharing patient-level electronic health information between different organizations.

A

HIE - HEALTH INFORMATION EXCHANGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

THE CIA INTEGRITY ENSURES THAT DATA WILL BE?
CONSISTENT AND TRUSTWORTHYNESS OF DATA GUARTEED

A

ACCURATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ELIMINATION OF BIAS IN PLATFORM

A

PREPROCESSIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAME SOME POTENTIAL RISK OF USING H-1B EMPLOYEES

A

LACK OF EMPLOYEE LOYALTY
LOSS OF EXPERTISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ENSURES DATA CAN BE ASSESSED WHEN AND WHERE NEEDED

A

AVAILABILITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HOW TO SECURE EMPLOYEE DATA MISUSE

A

LIMIT WHO CAN VIEW EMPLOYEE DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HOW TO AVOID BIASS TESTING

A

EQUAL REPRESENTATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

malware that stops you from using your computer or accessing your data until you meet certain demands

A

RANSOMEWEAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The key to prevention of a computer security incident is to implement a ? security solution to make computer break-ins so difficult that an attacker eventually gives up or is detected before much harm is inflicted. In THIS solution, if an attacker breaks through one AREA of security, another LEVEL must then be overcome.

A

LAYERED SOLUTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

After the solution to the problem has been implemented, monitor the results to see if the desired effect was achieved and observe its impact on the organization and the various stakeholders. Were the success criteria fully met? Were there any unintended consequences?

A

EVALUATION BENCHMARK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

habit that inclines people to do what is acceptable CHOICE BETWEEN GOOD AND BAD TYPE OF FRAMEWORK

A

VIRTUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a theory that says whether something is good or bad depends on its outcomes. An action that brings about more benefit than harm is good, while an action that causes more harm than benefit is not.

A

CONSEQUENTIALISM

17
Q

The personal principles upon which an individual bases his or her decisions about what is right and what is wrong.

18
Q

a code of behavior that is defined by the group to which an individual belongs.

19
Q

BYOD - BRING YOUR OWN DEVICE ISSUES

A

NO AUTHENTICATION
NON WORK RELATED INFO
MALEWARE

20
Q

business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.

A

BYOD - BRING YOUR OWN DEVICE

21
Q

acts are acts that conform to the law.
A system of rules that tells us what we can and cannot do.

22
Q

bring about the most happiness for the greatest number of people.

A

UTILITARANISM

23
Q

A lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern. The lawsuit is typically without merit and is used to intimidate critics out of fear of the cost and effort associated with a major legal battle.

A

SLAPP -STRATIGIC LAWSUIT AGAINST PUBLIC PARTICIPATION

24
Q

Also known as the Lincoln Law, was enacted during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army. War profiteers sometimes shipped boxes of sawdust instead of guns, for instance, and some swindled the Union Army into purchasing the same cavalry horses several times. When it was enacted, the act’s goal was to entice whistle-blowers to come forward by offering them a share of the money recovered.

A

FALSE CLAIMS ACT

25
Q

, also known as the Wiretap Act, regulates the interception of wire (telephone) and oral communications. It allows state and federal law enforcement officials to use wiretapping and electronic eavesdropping, but only under strict limitations. Under this act, a warrant must be obtained from a judge to conduct a wiretap.

A

TITLE III - OMNIBUS CRIME CONTROL AND SAFE STREETS ACT

26
Q

An individual has the right to elect not to have his or her personal data collected. ONE OF THE ELEMENTS UNDER THE EUROPEAN UNION DATA PROTECTION DIRECTIVE

27
Q

Aimed at protecting children from pornography. imposed $250,000 fines and prison terms of up to two years for the transmission of “indecent” material over the Internet.

A

CDA - COMMUNICATION DECENCY ACT

28
Q

concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers

A

CSR - CORPORATE SOCIAL RESPONSIBILITY

29
Q

The reduction in either the likelihood or the impact of the occurrence of a risk.

A

MITIGATION

30
Q

officially known as Regulation EU 2016/679) is designed to strengthen data protection for individuals within the EU by addressing the export of personal data outside the EU, enabling citizens to see and correct their personal data, and ensure data protection consistency across the EU. Organizations anywhere in the world that collect, store, or transfer personal data of EU citizens must work to ensure that their systems and procedures are compliant with this strict new framework

A

GDPR - GENERAL DATA PROTECTION REGULATION

31
Q

A type of lawsuit that organizations may file in order to gain subpoena power in an effort to learn the identity of anonymous Internet users who they believe have caused some form of harm to the organization through their postings.

A

JOHN DOE LAW

32
Q

(1)
subscribing to a professional code of ethics,

(2)
joining and participating in professional organizations,

(3)
obtaining appropriate certifications, and

(4)
supporting government licensing where available.

A

PROFESSIONAL PRACTICES FOR ENGINEERS