Practice Test 2 (new)
Liability
An organization increases its _____________ if it refuses to take measures—due care—to make sure that every employee knows what is acceptable and what is not, and the consequences of illegal or unethical actions.
Jurisdiction
Any court can impose its authority over an individual or organization if it can establish which of the following?
True
Due diligence requires that an organization make a valid and ongoing effort to protect others. ____________
Cultural Mores
Ethics are based on ___________________, which are the relatively fixed moral attitudes or customs of a societal group.
False
Ethics carry the sanction of a governing authority.
Aggregation
Information ____________ occurs when pieces of non-private data are combined to create information that violates privacy.
Malice
There are three general categories of unethical behavior that organizations and society should seek to eliminate. Which of the following is NOT one of them?
False
To protect intellectual property and competitive advantage, Congress passed the Entrepreneur Espionage Act (EEA) in 1996. ___________
The Electronic Communications Privacy Act of 1986
Which act is a collection of statutes that regulates the interception of wire, electronic, and oral communications?
HIPAA
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information, as well as policies and procedures to maintain them?
Common Good
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual, requiring each individual to contribute to that community?
Health Information Technology for Economic and Clinical Health Act
Which law addresses privacy and security concerns associated with the electronic transmission of PHI?
U.S Copyright Law
Which law extends protection to intellectual property, which includes words published in electronic formats?
The Computer Security Act
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federal computer system?
Descriptive Ethics
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right?
DMCA
Which of the following is an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially via the removal of technological copyright protection measures?
Restitution
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?
Deterrence
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls.
Deontological ethics
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?
Private
Which subset of civil law regulates the relationships among individuals and among individuals and organizations?
Tort law
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal, physical, or financial injury.
True
Deterrence is the best method for preventing an illegal or unethical activity. ____________
Deterrence
The act of attempting to prevent an unwanted action by threatening punishment or retaliation on the instigator if the act takes place is known as ___________.
Ethics
The branch of philosophy that considers nature, criteria, sources, logic, and the validity of moral judgment is known as ___________.
For political advantage
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?