LEP ISSUES Flashcards

1
Q
  1. The key difference between laws and ethics is that ethics carry the authority of a governing body and laws do not.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Due care requires that an organization make a valid effort to protect others and continually maintain this level of effort.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The Clipper Chip can be used to monitor or track private communications.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Every state has implemented uniform laws and regulations placed on organizational use of computer technology.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Thirty-four countries have ratified the European Council Cyber-Crime Convention as of April 2010.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. The United States has implemented a version of the DMCA law called the Database Right, in order to comply with Directive 95/46/EC.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. The Association for Computing Machinery and the Information Systems Security Association have the authority to banish violators of their ethical standards from practicing their trade.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Studies on ethics and computer use reveal that people of different nationalities have different perspectives; difficulties arise when one nationality’s ethical behavior violates the ethics of another national group.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Cultural differences can make it easy to determine what is and is not ethical—especially when it comes to the use of computers.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Studies have reported that the Pacific Rim countries of Singapore and Hong Kong are hotbeds of software piracy.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. The difference between a policy and a law is that ignorance of a law is an acceptable defense.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. There are four general causes of unethical and illegal behavior.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The Information Systems Security Association (ISSA) is a nonprofit society of information security professionals whose primary mission is to bring together qualified information security practitioners for information exchange and educational development.
A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. The Department of Homeland Security is the only U.S. federal agency charged with the protection of American information resources and the investigation of threats to, or attacks on, the resources.
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. DHS is made up of three directorates.
A

F

18
Q
  1. Established in January 2001, the National InfraGard Program began as a cooperative effort between the FBI’s Cleveland Field Office and local technology professionals.
A

T

19
Q
  1. The NSA is responsible for signal intelligence and information system security.
A

T

20
Q
  1. The Secret Service is charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes.
A

T

21
Q
  1. ____ law comprises a wide variety of laws that govern a nation or state.
    a. Criminal c. Public
    b. Civil d. Private
A

b. Civil

22
Q
  1. ____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.
    a. Public c. Civil
    b. Private d. Criminal
A

a. Public

23
Q
  1. The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.
    a. Violence c. Theft
    b. Fraud d. Usage
A

b. Fraud

24
Q
  1. According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.
    a. for purposes of commercial advantage c. to harass
    b. for private financial gain d. in furtherance of a criminal act
A

c. to harass

25
Q
  1. The National Information Infrastructure Protection Act of 1996 modified which Act?
    a. USA PATRIOT Act
    b. USA PATRIOT Improvement and Reauthorization Act
    c. Computer Security Act
    d. Computer Fraud and Abuse Act
A

d. Computer Fraud and Abuse Act

26
Q
  1. The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any ____ purposes.
    a. troubleshooting c. customer service
    b. billing d. marketing
A

d. marketing

27
Q
  1. The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
    a. Customer c. Computer
    b. Health Insurance d. Telecommunications
A

b. Health Insurance

28
Q
  1. Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications?
    a. Electronic Communications Privacy Act
    b. Financial Services Modernization Ac
    c. Sarbanes-Oxley Act
    d. Economic Espionage Act
A

a. Electronic Communications Privacy Act

29
Q
  1. Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?
    a. Financial Services Modernization Act
    b. Communications Act
    c. Computer Security Act
    d. Economic Espionage Act
A

a. Financial Services Modernization Act

30
Q
  1. What is the subject of the Computer Security Act?
    a. Federal Agency Information Security
    b. Telecommunications Common Carriers
    c. Cryptography Software Vendors
    d. Banking Industry
A

a. Federal Agency Information Security

31
Q
  1. Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?
    a. Electronic Communications Privacy Act of 1986
    b. Freedom of Information Act (FOIA)
    c. Computer Fraud and Abuse Act
    d. Federal Privacy Act of 1974
A

c. Computer Fraud and Abuse Act

32
Q
  1. ____ defines stiffer penalties for prosecution of terrorist crimes.
    a. USA Patriot Act c. Gramm-Leach-Bliley Act
    b. Sarbanes-Oxley Act d. Economic Espionage Act
A

a. USA Patriot Act

33
Q
  1. ____ attempts to prevent trade secrets from being illegally shared.
    a. Electronic Communications Privacy Act
    b. Sarbanes-Oxley Act
    c. Financial Services Modernization Act
    d. Economic Espionage Act
A

d. Economic Espionage Act

34
Q
  1. The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.
    a. Sarbanes-Oxley Act
    b. Gramm-Leach-Bliley Act
    c. U.S.A. Patriot Act
    d. Security and Freedom through Encryption Act
A

d. Security and Freedom through Encryption Act

35
Q
  1. What is the subject of the Sarbanes-Oxley Act?
    a. Banking c. Privacy
    b. Financial Reporting d. Trade secrets
A

b. Financial Reporting

36
Q
  1. The Council of Europe adopted the Convention of CyberCrime in ____.
    a. 1976 c. 1998
    b. 1986 d. 2001
A

d. 2001

37
Q
  1. Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?
    a. Australia c. Singapore
    b. United States d. Sweden
A

c. Singapore

38
Q
  1. Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____.
    a. with intent c. with malice
    b. by accident d. with negligence
A

b. by accident

39
Q
  1. Criminal or unethical ____ goes to the state of mind of the individual performing the act.
    a. attitude c. accident
    b. intent d. ignorance
A

b. intent

40
Q
  1. Laws and policies and their associated penalties only deter if which of the following conditions is present?
    a. Fear of penalty
    b. Probability of being caught
    c. Probability of penalty being administered
    d. All of the above
A

d. All of the above