CIS 205 Final Fall 18
For _____ prior to this incident Apple complied with court orders in drug, kidnapping, murder, and terrorism cases.
17 months
When was the seminal article about cyberware first published?
1993
When was Congress warned about the potential of a cyberattack?
2011
At the time of this writing how many states bar companies from asking employees or job applicants for their social networking passwords?
6
What legal precident did the goverment use to persuade the courts to compel Apple to assist them in breaking the cell phone of the terrorists?
AWA
Which of the following is a revolutionary biological advancement expected in the 21st century?
All of the listed answers 1) Clean energy 2) Targeted & safer medicines 3) New industries
The President's Commission for the Study of Bioethical Issues recommends that the U.S. government should expand efforts to collaborate with _____ to promote ongoing dialogue about emerging technologies such as synthetic biology as the field progresses.
All of the listed answers 1) International governments 2)The World Health Organization (WHO) 3)International bioethics organizations
Each of the following is a fact surrounding this case EXCEPT
All of the listed answers are correct
Each of the following is a danger of "loose talk" about cyberwars EXCEPT
All of the listed answers are correct 1) It leads the public to the belief that the military is in charge of dealing with the threats 2) The best defense is a good offense 3) It encourages the false idea that two states exist 4) Cyberwars will be obsolete as new technology evolves
Each of the following is a respect for the "giftedness" of things EXCEPT
All of the listed answers are correct 1) Which gifts are to be improved through training 2) Which gifts should be opposed 3) Which gifts are to housebroken through medication 4) Which gifts are to be accepted as is
Each of the following are used today in war EXCEPT
All of the listed answers are correct 1) drone strikes 2) robot soldiers 3) cyber hacks 4) computer viruses
Each of the following is an an effort that the U.S. government should make regarding cybersecurity EXCEPT
All of the listed answers are correct 1) pass legislation improving the government's ability to deter, investigate, and prosecute cybersecurity 2) support federal agencies' outreach on the NIST Framework 3) continue government efforts to raise awareness 4) continue government funding for cybersecurity research and development
Each of the following has been a reason for wars EXCEPT
All of the listed answers are correct 1) territory 2) anger 3) treasure 4) ideology
The Electronic Frontier Forum (EEF) says that _____.
Anonymity is a right conferred by the Constitution
What is the argument given by those who opposed Apple breaking into the smartphone?
Apple is being asked to develop a weakened version of its phone
According to Stewart Baker how did the right to privacy come about?
As a reactionary defense of the status quo
In order to circumvent any issues regarding using social media information in the hiring process what are some organizations doing?
Asking a third party to access the applicant's Web site for them.
Each of the following are reasons given by the "No" side regarding why a cyberwar will not occur EXCEPT
Attackers do not have a level of sophistication to carry out such an attack
In your textbook, you read eighteen recommendations that the President's Commission for the Study of Bioethical Issues made about how the government should proceed with regard to synthetic biology. The Commission recommended that initial actions should _____.
Be completed in 18 months (or faster) and progress be made public.
Why is society vulnerable to widespread and long-lasting damage from cyberattacks?
Because society is totally dependent on telecommunications networks
Leon Kass ("Yes" side) states which of the following?
Biotechnologies as aids for preventing bodily ills should be eagerly embraced
In 2015 the _____ government passed laws to forbid the use of unbreakable encryption.
British
Those who opposed Apple's assistance in breaking the cellphone encryption state that
By trusting the government you are also trusting third party government contractors
At the time of this article which two states had the strongest protections for employees?
Colorado & North Dakota
Which of the following will NOT be in the next wave of employment?
Creation of robots
Which of the following basic ethical principles for assessing emerging technologies reflects an approach to collaborative decision making that embraces respectful debate or opposing views and active participation by citizens?
Democratic deliberation
What is the difference between machines introduced during the Industrial Revolution and machines today in the Digital Revolution?
Digital Revolution machines can perform cognitive tasks
A(n) _____ attack attempts to deny service to legitimate users by overwhelming the target with activity.
Distributed denial-of-service (DDoS)
What can be the result of a nation that is the victim of a cyberwar
Economic waste
Which of the following is NOT a reason why employers use information found on social media sites?
Employers are no longer requiring applicants to submit resumes but instead are exclusively using information found on social media sites about the applicant.
To date the US Supreme Court has not considered the limits of drone survelliance under the _____.
Fourth Amendment
Each of the following about genetic enhancement is true EXCEPT
Genetic enhancement has only been used since the late 1980's
What is the difference between somatic cells and germline cells?
Germline cells allow changes to passed to subsequent generations
The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Comprehensive public and worker participation should be provided throughout the decision-making processes involving synthetic biology"?
Guarantee the right-to-know and democratic participation
What is the pivotal question?
How do we balance the benefits against the consequences of government surveillance of its citizens?
What is the major question regarding the use of robots?
How do we prepare for robots replacing workers?
Whether or not there is an expectation of privacy on a social media site depends upon which of the following?
How the user's account is set up and the information provided by the site about the conditions of privacy.
What do most security incidents involve?
Human error
In rejecting the government's request to force Apple to assist them, the judge made what legal argument?
If the courts were to issue such orders they would infringe on the authority and prerogatives of Congress
What was the result of skilled weavers being replaced by automated power looms over 200 years ago?
In the long run automation made the entire workforce more productive
When will the rights of individuals often suffer?
In times of crisis
What is the argument regarding why biotechnology enhancements should be used by athletes?
It is a means to compensate for the unfairness of size, strength, or native talent
According to Daniel Solove how do those who are defending the national-security side of the balance often view security and liberty?
It is a zero-sum trade off
Privacy advocates warn that drones may perform each of the following tasks EXCEPT _____
Launch offensive airstrikes against subversive individuals
At the heart of the use of collected data is that there has been a "wall" between what two entities?
Law enforcement and intelligence
Instead of giving up all privacy protections, what does Stewart Baker say that we must do instead?
Look for protections that work with technology instead of against it
The term _____ is used of anyone who is afraid of new technology.
Luddite
What do shorter product lifestyles require?
More flexible robots
Most medical and technology advancements are riskier in their _____ stages.
None of the listed answers are correct (earlier is correct)
The number of cyberattacks that have met the criteria for war is
None of the listed answers are correct 1) 2 2) 4 3) 6 4) 9
The fastest advances in enhancements will occur in which population?
None of the listed answers are correct 1) completed 2) later 3) middle 4) earlier
According to the President's Commission for the Study of Bioethical Issues, only through _____ will the government ensure ongoing public support and appropriate oversight of synthetic biology.
Openness and active engagement with all the relevant communities
The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Adequate and effective synthetic biology oversight requires an immediate emphasis on preventing known and potential human exposures to synthetic organisms that have not been proven safe"?
Protect public health and worker safety
Each of the following is a characteristic of an advanced persistent threat EXCEPT
Rely exclusively on viruses and worms as the type of malware payload to launch attacks
The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Those using synthetic biology must be financially and legally accountable for any harm caused to the public, worker health or the environment"?
Require corporate accountability and manufacturer liability
The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Implementing enforceable and prosecutable synthetic biology-specific regulations must be a prior condition for future developments in synthetic biology"?
Require mandatory synthetic biology-specific regulations
Which of the following basic ethical principles for assessing emerging technologies recognizes the importance of citizens and their representatives thinking and acting collectively for the betterment of all?
Responsible stewardship
Which of the following is NOT a proposed privacy solution?
Restrict when information may be collected
What is the latest trend in cybersecurity?
Security features are turned on by default
What is the primary question regarding this issue?
Should an employee's use of social media outside of the office affect that employee's job?
According to some individuals the government was arguing that Apple
Should restore a key that was available until late 2014
_____ aim(s) to apply standardized engineering techniques to biology and thereby create organisms or biological systems with novel or specialized functions to address countless needs.
Synthetic biology
The "Yes" argument of this issue says
Technology defenses are are essential but there is a need for new laws to improve the government's ability to deter cybercrime
Which of the follow steps are companies encouraged to do regarding posting information on social media sites?
Tell employees not to post information about trade secrets or product introduction dates
Each of the following is a criteria that must be met in order to qualify as a war EXCEPT
The act must be verified
What is "liberal eugenics"?
The birth of children with desirable traits is promoted while while those with undesirable traits are not targeted or suppressed
Why did Apple take a stand against breaking into the cell phone?
The government wanted Apple to do something against its will
The historic conceptions of privacy have not kept pace with
The historic conceptions of privacy have not kept pace with
Which of the following statments is true?
The public finds drones useful but they still have privacy concerns
Why are drones not considered as true robots?
They do not make their own decisions
Why do developing nations, despite having low cost labor, use robots?
To meet consistency and accuracy in the product being manufactured
The President's Commission for the Study of Bioethical Issues recommends the formation of _____, a new agency to oversee synthetic biology.
Trick question - The commission makes no such recommendation
Each of the following organizations has had the Customs and Border Patrol (CBP) fly a drone for EXCEPT _____.
US Army
Those who argue "No" say that current limitations make it difficult to
Use cyberweapons for anything other than single hard-to-repeat operations
Each of the following is a risk regarding biotechnologies EXCEPT
WRONG: All of the listed answers are correct 1) They can be pursued in harmful ways and with improper means 2) Desires for changes based on biotechnologies can be excessive 3) A misplaced gene can cause a fatal reaction 4) What we ask for often turns out to be not what we wanted
Because a user must agree to terms of service when joining a social media site like Facebook what impact does this have on the argument that setting the site's privacy control functions guarantee privacy?
Weakens
The basic question asked by the "No" side is (cyber warfare)
What counts as warfare?
Which of the following has been struck down by the US Supreme Court?
Whether police could use a GPS device to track the movement of a suspect without a warrant
What does the National Labor Relations Board (NLRB) say regarding this issue? (Employee Social Media Usage)
Workers have the right to freely discuss work conditions without fear of retribution, even online.
Which of the following is an ethical question being asked regarding genetic enhancement?
Would enhancements be distributed fairly through society?
The report from the President's Commission for the Study of Bioethical Issues states that a moratorium at this time on synthetic biology research _____.
Would inappropriately limit intellectual freedom
Funding for the Customs and Border Patrol (CBP) for the use of drones has resulted in _____.
a budget shortfall
Because there have yet to be any direct case law regarding expectations of privacy on a social networking site _____ must be made instead.
analogies from existing case law
When the robot revolution starts to occur it will happen _____.
fast
Those in favor of widespread genetic enhancements see these as steps towards
greater human freedom
Each of the following is a target of today's cyberwars EXCEPT
highway roads
The "zone of privacy" _____.
is guaranteed by the 1st Amendment
Per the _____ principle, the President's Commission for the Study of Bioethical Issues directs those in government to consider rules for the distribution of risks and benefits in research.
justice and fairness
The US Customs and Borders Protection (CBP) uses drones for each of the following areas EXCEPT _____.
large metropolitan areas
As robots take over more jobs capital will become _____ powerful and labor will become _____.
more powerful; more worthless
Many individuals claim that the government should be regulated _____.
much less when it pursues matters of national security than when it investigates "ordinary" crime
In this case the issues of all of these entities must be balanced EXCEPT
parents
Each of the following groups depend heavily upon security EXCEPT
politicians
Those on the "No" argument side ask the question, Will renewed physical energy _____?
produce more psychic energy as well?
What type of attack relies on tricking users into doing something that they would never do if fully aware of their actions?
social engineering
Individual privacy interests are the linchpin of
the 4th Amendment protection
Each of the following is a condition in which robots actually create or preserve jobs EXCEPT _____.
when skilled work is supplanted by robots