ITE

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

QN=31 Software manufacturers can file a civil suit against software pirates with penalties of up to ____ per copyrighted work.

$100,000

QN=41 An IT professional organization whose mission is to provide superior leadership and education in information technology and that has a goal to help its members make themselves more marketable within their industry is ____.

AITP

QN=75 A security policy outlines what needs to be done but not ____ to do it.

how

QN=48 IT workers have a key responsibility to establish an environment that supports ethical behavior by users. Such an environment discourages software piracy, minimizes the inappropriate use of corporate computing resources, and avoids the inappropriate sharing of ____.

information

QN=65 Edward Davidson ran a spamming operation out of his home that sent hundreds of thousands of spam e-mails. The header information of these e-mails concealed the actual sender from the recipient of the e-mail, a violation of the ____ Act.

CAN-SPAM

QN=52 ____ is a form of security incident that first registered on the CSI Computer Crime and Security Survey in 2007.

Instant messaging abuse

QN=51 The Societe Generale employee alleged to have committed fraud against the firm that resulted in a loss to the bank of some Ä4.9 billion was ____.

Jerome Kerviel

QN=8 ____ is a system of rules that tells us what we can and cannot do.

Laws

QN=58 ____ is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular files, by typing a specific series of keystrokes, or by a specific time or date.

Logic bomb

QN=71 ____ has made a strong commitment to support trustworthy computing and defined four pillars of trustworthy computing.

Microsoft

QN=7 ____ describes standards or codes of behavior expected of an individual by a group (nation, organization, profession) to which an individual belongs.

Morals

QN=76 The ____ is a nonregulatory federal agency within the U.S. Department of Commerce whose Computer Security Division develops security standards and technology against threats to the confidentiality, integrity, and availability of information and services.

National Institute of Standards and Technology

QN=94 Under the PATRIOT Act, the FBI can issue a ____ to compel banks, Internet service providers, and credit reporting companies to turn over information about their customers without a court order simply on the basis that information is needed for an ongoing investigation.

National Security Letter

QN=79 A software and/or hardware device that monitors system and network resources and activities, and notifies network security personnel when it identifies possible intrusions from outside the organization or misuse from within the organization is a(n) ____.

intrusion detection system

QN=80 A(n) ____ works to prevent an attack by blocking viruses, malformed packets, and other threats from getting into the protected network.

intrusion prevention system

QN=38 The U.S. Foreign Corrupt Practices Act makes it a crime to bribe a foreign official unless the payment was ____.

lawful under the laws of the foreign country in which it was paid

QN=13 The Department of Justice established sentencing guidelines that suggest more ____ treatment for convicted executives if their companies have ethics programs.

lenient

QN=26 From a legal perspective, IT workers are not recognized as professionals because they are not ____ by the state or federal government.

licensed

QN=27 Many courts have ruled that IT workers are not liable for ____ because they do not meet the legal definition of a professional.

malpractice

QN=73 Part of a thorough security risk assessment is to determine how each threat can be ____ so that it becomes much less likely to occur or, if it does occur, has less of an impact on the organizations.

mitigated

QN=29 As a result of improved ____, clients are able to break down their business processes into their fundamental steps and decide which they will perform themselves and which they will outsource to service providers.

modularization

QN=39 The Foreign Corrupt Practices Act permits facilitating payments so that an official performs or makes a(n) ____.

official function faster

QN=19 Ethical conduct criteria that could be used in an employeeís performance evaluation includes ____.

operating effectively in a multicultural environment

QN=21 The step in the five-step decision-making process during which the decision maker (s) consider laws, guidelines, policies, and principles that might apply to the decision is the ____ step.

evaluate and choose alternative

QN=53 A(n) ____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.

exploit

QN=55 Some IT security experts warn that is will not be long before we see ____ aimed at smartphones to steal userís data or turn them into remote-controlled bots.

exploits

QN=46 A device that limits access to the companyís network based on the organizationís Internet usage policy is called a(n) ____.

firewall

QN=77 Installation of a(n) ____ is the most common computer security precaution taken by businesses.

firewall

QN=60 It is estimated that about one in ____ personal computers in the United States is part of a botnet.

four

QN=54 Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue a ____ to eliminate the problem.

patch

QN=81 The concept of privacy is ____.

protected by a number of amendments in the Bill of Rights

QN=33 Whistle-blowing is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the ____.

public interest

QN=74 The concept of ____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the systemís benefits or the risks involved.

reasonable assurance

QN=93 A ____ allows the FBI to intercept any communications to or by an intelligence target without specifying the telephone line, computer, or other facility to be monitored.

roving wiretap

QN=18 In a(n) ____, an organization reviews how well it is meeting its ethical and social responsibility goals, and communications its new goals for the upcoming year.

social audit

QN=10 Someone who stands to gain or lose, depending on how a situation is resolved is called a(n) ____.

stakeholder

QN=43 A government license grants permission for an individual to engage in an activity or to operate a business. It is generally administered at the ____ level and often requires that the recipient pass a test of some kind.

state

QN=30 The mission of the Business Software Alliance is to ____.

stop the unauthorized copying of software

QN=11 Companies that develop and maintain strong employee relations ____.

suffer lower turnover rates

QN=96 A(n) ____ terminates or repeals a law or portions of it after a specific date unless further legislative action is taken to extend the law.

sunset provision

QN=35 To prove fraud in a court of law, prosecutors must demonstrate that ____.

the accused made a false representation of a material fact

QN=34 Before becoming a whistle-blower, an employee would normally call attention to a problem and try to correct it by first working with appropriate resources within ____.

the company

QN=15 A rapid increase in the appointment of corporate ethics officers typically follows

the revelation of a major business scandal.

QN=32 A ____ is information, generally unknown to the public, that a company has taken strong measures to keep confidential.

trade secret

QN=45 Because there are no ____ against which to compare a software engineerís professional behavior, he or she cannot be subject to malpractice lawsuits.

uniform standards

QN=40 Studies have shown that around ____ of all job applicants exaggerate their accomplishments on their resume.

30%

QN=17 While nearly half of all employees surveyed saw some form of ethical misconduct in 2007, less than ____ of those employees reported the misconduct to management.

60%

QN=88 The Foreign Intelligence Surveillance Act ____.

Allows surveillance, without court order, within the United States for up to a year unless the surveillance will acquire the contents of any communications to which a U.S. person is a party

QN=99 The ____ seal program identifies online businesses that honor their own stated privacy protection policies.

BBBOnLine

QN=16 In a for-profit organization, it is the primary objective of the ____ to oversee the organizationís business activities and management for the benefit of shareholders, employees, customers, suppliers, and the community.

Board of Directors

QN=66 ____ have become the primary means for distributing spam, malware, and phishing scams.

Botnets

QN=91 Under the ____, the Federal Communications Commission responded to appeals from the Justice Department by requiring providers of Internet phone services and broadband services to ensure that their equipment accommodated the use of law enforcement wiretaps.

Communications Assistance for Law Enforcement Act

QN=68 ____ is an annual gathering in Las Vegas of computer hackers.

DEFCON

QN=12 A judge found ____ guilty of not providing timely on-site technical support that customers were entitled to and, as a result, lost its place as the worldís largest computer manufacturer.

Dell

QN=63 ____ is (are) the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.

E-mail spam

QN=84 The ____ is an act that repealed a depression-era law known as Glass-Steagell. Some place partial blame for the financial crises that began in 2008 on the passage of this act and the loosening of banking restrictions.

Gramm-Leach-Bliley Act

QN=85 Under the ____, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used, and how the data is protected.

Gramm-Leach-Bliley Act

QN=89 The ____, passed as an amendment to Title III of the Omnibus Crime Control and Safe Streets Act establishes a requirement for court-approved law enforcement use of a pen register or trap and trace.

Electronic Communications Privacy Act

QN=90 The ____ prohibits unauthorized access to stored wire and electronic communications, such as the contents of e-mail in-boxes, instant messages, message boards, and social networking sites that are not readily accessible to the general public.

Electronic Communications Privacy Act

QN=98 The ____ requires member countries to ensure that data transferred to non-European Union countries is protected, and bars the export of data to countries that do not have data privacy protection standards comparable to the European Unionís.

European Union Data Protection Directive

QN=83 The ____ is a 1970 federal act that outlines who may access your credit information, how you can find out what is in your file, how to dispute inaccurate data, and how long data is retained.

Fair Credit Reporting Act

QN=97 The 1980 privacy guidelines set by the Organisation for Economic Co-operation and Development are also known as the ____ and are often held up as the model of ethical treatment of consumer data for organizations to adopt.

Fair Information Practices

QN=95 In Doe v. Holder, the courts ruled that the NSL gag rule (prohibits NSL recipients from informing anyone that the government has secretly requested his or her records) violates the ____.

First Amendment

QN=101 The ____ enables the public to gain access to certain government records.

Freedom of Information Act

QN=9 ____ hired private investigators to identify members of its board of directors who were responsible for leaking confidential company information to the press.

Hewlett-Packard

QN=56 ____ viruses have become a common and easily created form of virus. Attackers use an application macro language to create these programs that infect documents and templates.

Macro

QN=20 ____ is a likely cause of employees feeling ìNo one will ever know the difference, and if they do, so what?î

Management failing to hold people accountable for unethical actions

QN=36 ____ occurs when a party fails to perform certain express or implied obligation, which impairs or destroys the essence of a contract.

Material breach of contract

QN=72 A strong security program begins by ____.

assessing the threats to an organizationís computers and network

QN=14 One characteristic of an organization that has a successful ethics program is that ____.

employees are rewarded for ethical behavior.

Which of the following observations is true of ethics? a. It is descriptive in nature. b. It deals with our reasoning about how we should act. c. It provides an account of how and why people act the way they do. d. It is equivalent to law-abiding behavior.

b

QN=64 Spammers can defeat the registration process of free e-mail services by launching a coordinated ____ attack that can sign up for thousands of untraceable e-mail accounts.

bot

QN=50 If misrepresentation causes a party to enter into a contract, that party may have the legal right to ____.

cancel the contract and seek reimbursement for damages

QN=102 The ____ prohibits the government from concealing the existence of any personal data record-keeping systems.

Privacy Act

QN=42 Certification indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the ____.

certifying organization

QN=24 An approach to ethical decision making that is based on a vision of society as a community whose members work together to achieve a common set of values and goals is the ____ approach.

common good

QN=49 A feature that is associated with a bribe is that a bribe ____.

encourages an obligation for the recipient

QN=28 As a result of increased ____, clients and service providers have built their working relationships on the expectation that they can communicate easily and instantly around the globe through electronic teleconferences, audio conferences, e-mail, and wireless devices.

connectivity

QN=47 Adherence to a professional code of ethics means that practitioners use a common set of ____ as a guideline for ethical decision making.

core values and beliefs

QN=37 Accepting payment of entry fees for a golf tournament from a supplier is ____.

could be perceived as a bribe

QN=57 ____ was a worm that was released in 2007 and caused billions of dollars in damages.

Storm

QN=67 The ____ is a type of computer crime perpetrator whose primary motive is to achieve a financial gain.

cybercriminal

QN=69 Chinese hackers have repeatedly hacked into systems to intercept e-mails between U.S. and UK officials. This is an example of ____.

cyberterrorism

. Which of the following is an approach advocated while teaching ethics? a. Teachers should teach ethical dogma to a passive audience. b. Teachers should consider acceptance of customary norms as an adequate ethical perspective. c. Teachers should understand that their role is only to tell the right answers to their students. d. Teachers should challenge students to think for themselves.

d

QN=23 Part of developing a good problem statement includes ____.

determining who is directly affected by the problem

QN=22 The step of the five-step decision process during which those who will be affected by the decision are identified is the ____ step.

develop problem statement

QN=100 For a Web site to receive the ____ seal, its operators must demonstrate that it adheres to established privacy principles. The Web site must also agree to comply with that organizationís oversight and consumer resolution process, and pay an annual fee.

TRUSTe

QN=59 A ____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.

distributed denial-of-service

QN=87 The Childrenís Online Privacy Protection Act ____.

does not cover the dissemination of information to children

QN=78 The ____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nationís Internet infrastructure against cyberattacks.

U.S. Computer Emergency Readiness Team

QN=70 The ____ is a Federal law that primarily addresses unlawful access to stored electronic communications.

US Code Title 18, Part I, Chapter 121

QN=92 The ____ gave sweeping new powers both to domestic law enforcement and international intelligence agencies, including increasing the ability of law enforcement agencies to search telephone, e-mail, medical, financial, and other records.

USA PATRIOT Act

QN=61 The ____ code portion of a rootkit gets the rootkit installation started and can be easily activated by clicking on a link to a malicious Website in an e-mail or opening an infected .pdf file.

dropper

QN=44 The obligation to protect people against any unreasonable harm or risk is called ____.

duty of care

Philosophers often emphasize that ethics is _____, which means that it deals with a personís reasoning about how he or she should act. a. normative b. descriptive c. stipulative d. persuasive

a

QN=25 An approach to ethical decision making that states you should choose the action or policy that has the best overall consequences for all people who are directly or indirectly affected is the ____ approach.

utilitarian

QN=62 Rootkits are designed so cleverly that it is difficult to even discover if they are installed on a computer. The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide ____.

valid test results

QN=6 Habits that incline people to do what is acceptable are called ____.

virtues

QN=82 The Supreme Court has ruled that ____.

without a reasonable expectation of privacy, there is no privacy right

QN=86 Under the HIPAA provisions, healthcare providers must obtain ____ from patients prior to disclosing any information in their medical records.

written consent


संबंधित स्टडी सेट्स

Cardiac, Immune, Cancer, Endocrine, Sensory, Neuro Disorders

View Set

Verb + -ing or to.... (try/need/help)

View Set

PT677- Ankle Sprains & Complications

View Set

Week 3 - Requirements Elicitation

View Set

OB/GYN Registry Review Chapter 32 Fetal Environment And Maternal Complications

View Set

Chapter 11 NCLEX-Style Review Questions

View Set

Integrated Business Policy & Strategy Midterm

View Set

Chapter 5 Cost-Volume-Profit-Relationships

View Set