CIS 205 Final Fall 18

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

For _____ prior to this incident Apple complied with court orders in drug, kidnapping, murder, and terrorism cases.

17 months

When was the seminal article about cyberware first published?

1993

When was Congress warned about the potential of a cyberattack?

2011

At the time of this writing how many states bar companies from asking employees or job applicants for their social networking passwords?

6

What legal precident did the goverment use to persuade the courts to compel Apple to assist them in breaking the cell phone of the terrorists?

AWA

Which of the following is a revolutionary biological advancement expected in the 21st century?

All of the listed answers 1) Clean energy 2) Targeted & safer medicines 3) New industries

The President's Commission for the Study of Bioethical Issues recommends that the U.S. government should expand efforts to collaborate with _____ to promote ongoing dialogue about emerging technologies such as synthetic biology as the field progresses.

All of the listed answers 1) International governments 2)The World Health Organization (WHO) 3)International bioethics organizations

Each of the following is a fact surrounding this case EXCEPT

All of the listed answers are correct

Each of the following is a danger of "loose talk" about cyberwars EXCEPT

All of the listed answers are correct 1) It leads the public to the belief that the military is in charge of dealing with the threats 2) The best defense is a good offense 3) It encourages the false idea that two states exist 4) Cyberwars will be obsolete as new technology evolves

Each of the following is a respect for the "giftedness" of things EXCEPT

All of the listed answers are correct 1) Which gifts are to be improved through training 2) Which gifts should be opposed 3) Which gifts are to housebroken through medication 4) Which gifts are to be accepted as is

Each of the following are used today in war EXCEPT

All of the listed answers are correct 1) drone strikes 2) robot soldiers 3) cyber hacks 4) computer viruses

Each of the following is an an effort that the U.S. government should make regarding cybersecurity EXCEPT

All of the listed answers are correct 1) pass legislation improving the government's ability to deter, investigate, and prosecute cybersecurity 2) support federal agencies' outreach on the NIST Framework 3) continue government efforts to raise awareness 4) continue government funding for cybersecurity research and development

Each of the following has been a reason for wars EXCEPT

All of the listed answers are correct 1) territory 2) anger 3) treasure 4) ideology

The Electronic Frontier Forum (EEF) says that _____.

Anonymity is a right conferred by the Constitution

What is the argument given by those who opposed Apple breaking into the smartphone?

Apple is being asked to develop a weakened version of its phone

According to Stewart Baker how did the right to privacy come about?

As a reactionary defense of the status quo

In order to circumvent any issues regarding using social media information in the hiring process what are some organizations doing?

Asking a third party to access the applicant's Web site for them.

Each of the following are reasons given by the "No" side regarding why a cyberwar will not occur EXCEPT

Attackers do not have a level of sophistication to carry out such an attack

In your textbook, you read eighteen recommendations that the President's Commission for the Study of Bioethical Issues made about how the government should proceed with regard to synthetic biology. The Commission recommended that initial actions should _____.

Be completed in 18 months (or faster) and progress be made public.

Why is society vulnerable to widespread and long-lasting damage from cyberattacks?

Because society is totally dependent on telecommunications networks

Leon Kass ("Yes" side) states which of the following?

Biotechnologies as aids for preventing bodily ills should be eagerly embraced

In 2015 the _____ government passed laws to forbid the use of unbreakable encryption.

British

Those who opposed Apple's assistance in breaking the cellphone encryption state that

By trusting the government you are also trusting third party government contractors

At the time of this article which two states had the strongest protections for employees?

Colorado & North Dakota

Which of the following will NOT be in the next wave of employment?

Creation of robots

Which of the following basic ethical principles for assessing emerging technologies reflects an approach to collaborative decision making that embraces respectful debate or opposing views and active participation by citizens?

Democratic deliberation

What is the difference between machines introduced during the Industrial Revolution and machines today in the Digital Revolution?

Digital Revolution machines can perform cognitive tasks

A(n) _____ attack attempts to deny service to legitimate users by overwhelming the target with activity.

Distributed denial-of-service (DDoS)

What can be the result of a nation that is the victim of a cyberwar

Economic waste

Which of the following is NOT a reason why employers use information found on social media sites?

Employers are no longer requiring applicants to submit resumes but instead are exclusively using information found on social media sites about the applicant.

To date the US Supreme Court has not considered the limits of drone survelliance under the _____.

Fourth Amendment

Each of the following about genetic enhancement is true EXCEPT

Genetic enhancement has only been used since the late 1980's

What is the difference between somatic cells and germline cells?

Germline cells allow changes to passed to subsequent generations

The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Comprehensive public and worker participation should be provided throughout the decision-making processes involving synthetic biology"?

Guarantee the right-to-know and democratic participation

What is the pivotal question?

How do we balance the benefits against the consequences of government surveillance of its citizens?

What is the major question regarding the use of robots?

How do we prepare for robots replacing workers?

Whether or not there is an expectation of privacy on a social media site depends upon which of the following?

How the user's account is set up and the information provided by the site about the conditions of privacy.

What do most security incidents involve?

Human error

In rejecting the government's request to force Apple to assist them, the judge made what legal argument?

If the courts were to issue such orders they would infringe on the authority and prerogatives of Congress

What was the result of skilled weavers being replaced by automated power looms over 200 years ago?

In the long run automation made the entire workforce more productive

When will the rights of individuals often suffer?

In times of crisis

What is the argument regarding why biotechnology enhancements should be used by athletes?

It is a means to compensate for the unfairness of size, strength, or native talent

According to Daniel Solove how do those who are defending the national-security side of the balance often view security and liberty?

It is a zero-sum trade off

Privacy advocates warn that drones may perform each of the following tasks EXCEPT _____

Launch offensive airstrikes against subversive individuals

At the heart of the use of collected data is that there has been a "wall" between what two entities?

Law enforcement and intelligence

Instead of giving up all privacy protections, what does Stewart Baker say that we must do instead?

Look for protections that work with technology instead of against it

The term _____ is used of anyone who is afraid of new technology.

Luddite

What do shorter product lifestyles require?

More flexible robots

Most medical and technology advancements are riskier in their _____ stages.

None of the listed answers are correct (earlier is correct)

The number of cyberattacks that have met the criteria for war is

None of the listed answers are correct 1) 2 2) 4 3) 6 4) 9

The fastest advances in enhancements will occur in which population?

None of the listed answers are correct 1) completed 2) later 3) middle 4) earlier

According to the President's Commission for the Study of Bioethical Issues, only through _____ will the government ensure ongoing public support and appropriate oversight of synthetic biology.

Openness and active engagement with all the relevant communities

The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Adequate and effective synthetic biology oversight requires an immediate emphasis on preventing known and potential human exposures to synthetic organisms that have not been proven safe"?

Protect public health and worker safety

Each of the following is a characteristic of an advanced persistent threat EXCEPT

Rely exclusively on viruses and worms as the type of malware payload to launch attacks

The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Those using synthetic biology must be financially and legally accountable for any harm caused to the public, worker health or the environment"?

Require corporate accountability and manufacturer liability

The Friends of the Earth recommend seven principles for the effective assessment and oversight of synthetic biology. Which of those principles states, "Implementing enforceable and prosecutable synthetic biology-specific regulations must be a prior condition for future developments in synthetic biology"?

Require mandatory synthetic biology-specific regulations

Which of the following basic ethical principles for assessing emerging technologies recognizes the importance of citizens and their representatives thinking and acting collectively for the betterment of all?

Responsible stewardship

Which of the following is NOT a proposed privacy solution?

Restrict when information may be collected

What is the latest trend in cybersecurity?

Security features are turned on by default

What is the primary question regarding this issue?

Should an employee's use of social media outside of the office affect that employee's job?

According to some individuals the government was arguing that Apple

Should restore a key that was available until late 2014

_____ aim(s) to apply standardized engineering techniques to biology and thereby create organisms or biological systems with novel or specialized functions to address countless needs.

Synthetic biology

The "Yes" argument of this issue says

Technology defenses are are essential but there is a need for new laws to improve the government's ability to deter cybercrime

Which of the follow steps are companies encouraged to do regarding posting information on social media sites?

Tell employees not to post information about trade secrets or product introduction dates

Each of the following is a criteria that must be met in order to qualify as a war EXCEPT

The act must be verified

What is "liberal eugenics"?

The birth of children with desirable traits is promoted while while those with undesirable traits are not targeted or suppressed

Why did Apple take a stand against breaking into the cell phone?

The government wanted Apple to do something against its will

The historic conceptions of privacy have not kept pace with

The historic conceptions of privacy have not kept pace with

Which of the following statments is true?

The public finds drones useful but they still have privacy concerns

Why are drones not considered as true robots?

They do not make their own decisions

Why do developing nations, despite having low cost labor, use robots?

To meet consistency and accuracy in the product being manufactured

The President's Commission for the Study of Bioethical Issues recommends the formation of _____, a new agency to oversee synthetic biology.

Trick question - The commission makes no such recommendation

Each of the following organizations has had the Customs and Border Patrol (CBP) fly a drone for EXCEPT _____.

US Army

Those who argue "No" say that current limitations make it difficult to

Use cyberweapons for anything other than single hard-to-repeat operations

Each of the following is a risk regarding biotechnologies EXCEPT

WRONG: All of the listed answers are correct 1) They can be pursued in harmful ways and with improper means 2) Desires for changes based on biotechnologies can be excessive 3) A misplaced gene can cause a fatal reaction 4) What we ask for often turns out to be not what we wanted

Because a user must agree to terms of service when joining a social media site like Facebook what impact does this have on the argument that setting the site's privacy control functions guarantee privacy?

Weakens

The basic question asked by the "No" side is (cyber warfare)

What counts as warfare?

Which of the following has been struck down by the US Supreme Court?

Whether police could use a GPS device to track the movement of a suspect without a warrant

What does the National Labor Relations Board (NLRB) say regarding this issue? (Employee Social Media Usage)

Workers have the right to freely discuss work conditions without fear of retribution, even online.

Which of the following is an ethical question being asked regarding genetic enhancement?

Would enhancements be distributed fairly through society?

The report from the President's Commission for the Study of Bioethical Issues states that a moratorium at this time on synthetic biology research _____.

Would inappropriately limit intellectual freedom

Funding for the Customs and Border Patrol (CBP) for the use of drones has resulted in _____.

a budget shortfall

Because there have yet to be any direct case law regarding expectations of privacy on a social networking site _____ must be made instead.

analogies from existing case law

When the robot revolution starts to occur it will happen _____.

fast

Those in favor of widespread genetic enhancements see these as steps towards

greater human freedom

Each of the following is a target of today's cyberwars EXCEPT

highway roads

The "zone of privacy" _____.

is guaranteed by the 1st Amendment

Per the _____ principle, the President's Commission for the Study of Bioethical Issues directs those in government to consider rules for the distribution of risks and benefits in research.

justice and fairness

The US Customs and Borders Protection (CBP) uses drones for each of the following areas EXCEPT _____.

large metropolitan areas

As robots take over more jobs capital will become _____ powerful and labor will become _____.

more powerful; more worthless

Many individuals claim that the government should be regulated _____.

much less when it pursues matters of national security than when it investigates "ordinary" crime

In this case the issues of all of these entities must be balanced EXCEPT

parents

Each of the following groups depend heavily upon security EXCEPT

politicians

Those on the "No" argument side ask the question, Will renewed physical energy _____?

produce more psychic energy as well?

What type of attack relies on tricking users into doing something that they would never do if fully aware of their actions?

social engineering

Individual privacy interests are the linchpin of

the 4th Amendment protection

Each of the following is a condition in which robots actually create or preserve jobs EXCEPT _____.

when skilled work is supplanted by robots


संबंधित स्टडी सेट्स

Chapter 7: Legal Dimensions of Nursing Practice

View Set

Med Surg Caring for Clients with Disorders of the Lower GI Tract Part 2 Chapter 46

View Set

Lokalisatie meridianen (bl, ni, pc, 3w, gb, le)

View Set

Retirement and Other Insurance Concepts

View Set

BUS 226- Chapter 12: Performance and Breach of Sales and Lease Contracts

View Set

Praxis Basic Skills for Educators - (5751): Reading & Writing

View Set