ITM Chapter 12

Ace your homework & exams now with Quizwiz!

7. Internet censorship limits access to certain Web sites.

true

38. The Fourth Amendment of the U.S. Constitution _____. a. protects the privacy of intermediate school students b. protects the privacy of college students c. protects the privacy of private employees d. protects the privacy of government employees

d. protects the privacy of government employees

49. Consider a country with a law stating that citizens below the age of 25 must not have access to the Internet. This type of law creates a _____. a. net neutrality b. digital divide c. net equality d. social divide

b. digital divide

35. The _____ of a Web site states what sort of information about customers is captured and how that information may be used by the capturing organization. a. extension b. privacy policy c. browser certificate d. developer console

b. privacy policy

36. Who creates personal profiles using the data collected through the use of cookies? a. A chief privacy officer b. A data warehouse officer c. A data broker d. A public administrative broker

c. A data broker

12. Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles? a. Dashboard recognizer b. Stingray c. Automatic license plate reader d. Secure flight program

c. Automatic license plate reader

20. Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid. a. Hacking b. Spamming c. Doxing d. Cracking

c. Doxing

1. _____ is a set of beliefs about right and wrong behavior. a. Moral b. Law c. Ethics d. Value

c. Ethics

28. A _____ is charged with the responsibility of ensuring that an organization does not violate state and federal government regulations. a. Data Security Officer (DSO) b. Chief Operations Officer (COO) c. Database Privacy Officer (DPO) d. Chief Privacy Officer (CPO)

d. Chief Privacy Officer (CPO)

33. Which of the following statements is true of a cookie? a. A cookie can create copies of itself and spread to other networks to execute and replicate again. b. The one time password of a transaction is captured and stored under a cookie on a company's Web server. c. A cookie pulls data from disparate data sources to populate and maintain a data warehouse. d. Data about user preferences and activity is captured and stored under a cookie on a company's Web server.

d. Data about user preferences and activity is captured and stored under a cookie on a company's Web server.

54. The _____ reimburses telecommunications, Internet access, and internal connections providers for discounts on eligible services provided to schools and libraries. a. Education Network (E-Net) program b. Mobile Network (M-Net) program c. Internet Mate (I-Mate) program d. Education Rate (E-Rate) program

d. Education Rate (E-Rate) program

24. The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection. a. Code of Fair Information Practices b. European Data Transfer Act c. Organization for Economic Cooperation and Development privacy guideline d. European Union Data Protection Directive

d. European Union Data Protection Directive

13. _____ identify and reference people in photos and videos posted on Facebook. a. Facebook shares b. Facebook notifications c. Facebook messages d. Facebook tags

d. Facebook tags

10. The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy." a. First Amendment b. Second Amendment c. Third Amendment d. Fourth Amendment

d. Fourth Amendment

44. _____ is the control of the publishing of information on the Internet. a. Internet graying b. Internet flagship c. Internet catalysis d. Internet censorship

d. Internet censorship

14. Which of the following is true of a cookie? a. It saves shortcuts to Web sites and navigates to them within a few seconds. b. It helps users to browse incognito by hiding their browsing data. c. It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request. d. It captures browsing history for Web site customization and personalization purposes.

d. It captures browsing history for Web site customization and personalization purposes.

3. Which of the following defines law? a. It is an individual's beliefs about right and wrong. b. It is a set of beliefs about right and wrong behavior that are universally accepted. c. It is a set of principles and core values that are essential to ethical work and governs a practitioner's behavior. d. It is a system of rules enforced by a set of institutions that states what a person can and cannot do.

d. It is a system of rules enforced by a set of institutions that states what a person can and cannot do.

65. Which of the following is a reason for the rapid growth of the Internet of Everything? a. Limited availability of network services b. Increased availability of expensive smart devices c. Increased availability of network access d. Limited availability of inexpensive smart devices

c. Increased availability of network access

16. Which of the following is true of stingray? a. It supports operations that require aerial surveillance. b. It is a national security agency surveillance program that collects Internet data including search histories. c. It impersonates a cell tower and forces all mobile phones within range to connect to it. d. It is an airline passenger prescreening program that checks travelers' personal information.

c. It impersonates a cell tower and forces all mobile phones within range to connect to it.

4. Which of the following is true of a code of ethics? a. It is an individual's beliefs about right and wrong. b. It is a set of beliefs about right and wrong behavior that are universally accepted. c. It states the principles and core values that are essential to any professional's work and that govern their behavior. d. It is a system of rules enforced by a set of institutions that states what a person can and cannot do

c. It states the principles and core values that are essential to any professional's work and that govern their behavior.

30. Identify the framework developed by the U.S. Department of Commerce and the European Commission to ensure that U.S. companies don't experience interruptions in their dealings with countries in the European Union. a. Net neutrality b. Terms of Use c. Safe harbor d. Struts

c. Safe harbor

48. Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology. a. The change management continuum model b. Net neutrality c. The digital divide d. Internet traffic

c. The digital divide

57. What is the debate over net neutrality? a. To decrease the incentives of Internet Service Providers b. To support only the existing services and cancel the new services c. To keep the Internet open and impartial d. To reduce the network of Internet Service Providers

c. To keep the Internet open and impartial

47. When does the support for open access to Internet grow in a country? a. When only private-sector organizations gain online access b. When only government officials gain online access c. When more people gain online access d. When online access is limited to schools and colleges

c. When more people gain online access

43. Social networking users are prone to _____. a. cyberethics b. advanced persistent threat c. identity theft d. cyberterrorism

c. identity theft

60. In 2002, the Federal Communications Commission decided that most broadband Internet services qualified as _____ services. a. investment b. technology c. information d. commercial

c. information

9. The Fourth Amendment to the U.S. Constitution was adopted to _____. a. guarantee fair trial and other rights of an accused b. prohibit excessive bail as well as cruel and unusual punishment c. protect people from unreasonable searches and seizures of properties d. guarantee the rights to freedom of religion, freedom of expression, and freedom to assemble

c. protect people from unreasonable searches and seizures of properties

23. The _____ represent the international consensus regarding the collection and management of personal information. a. Code of Fair Information Practices b. 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines c. European Union Data Protection Directives d. 1965 Organization for Data Brokering and Doxing (ODBD) privacy guidelines

b. 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines

32. Which of the following is a small file that is placed on the computer hard drive of visitors to an organization's site? a. A wiki b. A cookie c. An antivirus d. A bookmark

b. A cookie

31. Who should be briefed on planned and existing marketing programs as well as information systems and databases that involve the collection or dissemination of consumer data? a. Editor-in-chief b. Chief Privacy Officer c. Chief mentor d. Chief Underwriting Officer

b. Chief Privacy Officer

5. Which of the following acts as a reference point to determine what is legal and what is ethical? a. Code of laws b. Code of ethics c. Code of conduct d. Code of practice

b. Code of ethics

21. _____ is used to publicize personal details about someone purely for the purpose of encouraging others to engage in harassment of the victim. a. Hacking b. Doxing c. Phishing d. Distributed denial-of-service

b. Doxing

55. The Schools and Libraries Program of the Universal Service Fund (USF) is the full name of the _____. a. Education Network (E-Net) program b. Education Rate (E-Rate) program c. Internet Mate (I-Mate) program d. Mobile Network (M-Net) program

b. Education Rate (E-Rate) program

46. Linc Corp., a software firm, decides to ban social networking sites for its employees at the workplace. However, the employees are able to access other Web sites. Identify the strategy adopted by the firm. a. Cyberespionage b. Internet censorship c. Internet rootkit d. Spear phishing

b. Internet censorship

59. Which of the following is true of the Communications Act of 1934? a. It created the Education Rate (E-Rate) program's Terms of Use policy to oversee all interstate and foreign communications. b. It created the Federal Communications Commission to oversee all interstate and foreign communications. c. It created the decision support program to oversee all interstate and foreign communications. d. It created the Universal Service Fund (USF) to oversee all interstate and foreign communications.

b. It created the Federal Communications Commission to oversee all interstate and foreign communications.

39. Identify a drawback of the Fourth Amendment of the U.S. Constitution. a. It does not benefit government employees. b. It does not benefit private employees. c. It benefits only voluntary organizations. d. It benefits only nonprofit organizations.

b. It does not benefit private employees.

52. Which of the following is true of the Education Rate (E-Rate) program? a. It provides dial-up Internet services to multinational companies. b. It provides broadband Internet services to schools and libraries. c. It provides broadband Internet services to multinational companies. d. It provides dial-up Internet services to schools and libraries.

b. It provides broadband Internet services to schools and libraries.

15. Which of the following is a national security agency surveillance program that collects Internet data including search histories? a. Stingray b. PRISM c. Secure flight program d. Backscatter imaging scanners

b. PRISM

42. Which of the following policies often contains clauses that permit a social networking operator to collect and store data on users or even share it with third parties? a. Terms of Trade policy b. Terms of Use policy c. Terms of Endearment policy d. Terms of Retention policy

b. Terms of Use policy

25. Mapua Corp., a multinational corporation based in Germany, has decided to relocate its business to Japan. It faces difficulties in transferring the personal data of its employees from Germany to Japan. Which of the following is causing this difficulty? a. The 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines b. The European Union Data Protection Directive c. The Code of Fair Information Practices d. The Code of Fair Transportation Security

b. The European Union Data Protection Directive

61. _____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices. a. The Internet of Digital divide b. The Internet of Things c. The Internet of Data d. The Internet of Regulations

b. The Internet of Things

29. Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective _____ program. a. data piracy b. data privacy c. data recovery d. data structuring

b. data privacy

3. Laws are enforced by a set of institutions such as the police, courts, and law-making bodies.

true

26. A company based in Houston wants to expand its business to Rome. The human resources department will run background checks from Houston. Identify the condition that must be satisfied to make this possible. a. A "safe harbor" framework must be developed. b. The US Patriot Act must be implemented. c. A doxing framework must be developed. d. The Digital Millennium Copyright Act must be implemented.

a. A "safe harbor" framework must be developed.

27. Who is appointed by an organization to define, implement, and oversee a set of data privacy policies? a. A Chief Privacy Officer (CPO) b. A Chief Operations Officer (COO) c. A Database Privacy Officer (DPO) d. A Data warehouse Officer (DWO)

a. A Chief Privacy Officer (CPO)

11. Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer. a. Customer relationship management b. Business intelligence management c. Access information management d. Enterprise resource management

a. Customer relationship management

17. _____ create profiles on people based on aggregated data from public records such as business directories and social media networks. a. Data brokers b. Yellow pagers c. Data miners d. Drill-down analysts

a. Data brokers

19. David collects pieces of information about individuals garnered from data brokers. He then uses this information to threaten the individuals to publicly uncover their personal details until a monetary ransom is paid to him. Identify the tactic used by David to gather the information. a. Doxing b. Spamming c. Hacking d. Cracking

a. Doxing

53. Which of the following programs was created through the Telecommunications Act of 1996? a. Education Rate (E-Rate) program b. Mobile Network (M-Net) program c. Internet Mate (I-Mate) program d. Education Network (E-Net) program

a. Education Rate (E-Rate) program

37. Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy. a. Increased legal liabilities b. Increased productivity c. Decreased leisure hours d. Increased peer discussion

a. Increased legal liabilities

45. Which of the following is a feature of Internet censorship? a. Monitoring the Internet activity of individuals b. Storing user credentials such as name and address c. Selling user data to third parties d. Pilfering credit card information from online shoppers

a. Monitoring the Internet activity of individuals

56. _____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner. a. Net neutrality b. Internet of Things c. Cloud computing d. Cryptography

a. Net neutrality

41. Which of the following policies should be agreed by a user before joining a social networking page? a. Terms of Use policy b. Privacy policy c. Information technology usage policy d. Profile update policy

a. Terms of Use policy

22. Which of the following must be adopted by a company to treat its customers' data responsibly? a. The Code of Fair Information Practices b. The European Union Data Protection Directives c. The 1965 Organization for Data Brokering and Doxing (ODBD) privacy guidelines d. The 1957 Organization for Economic Cooperation and Development (OECD) privacy guidelines

a. The Code of Fair Information Practices

8. Which of the following amendments to the U.S. Constitution comes into play in privacy issues if it appears that data is being gathered to track the movement of groups of people, as this could threaten their right to assemble or gather peacefully? a. The First Amendment b. The Second Amendment c. The Third Amendment d. The Fourth Amendment

a. The First Amendment

2. Which of the following best describes morals? a. They are an individual's beliefs about right and wrong. b. They are a set of beliefs about right and wrong behavior that are universally accepted. c. They consist of principles and core values that are essential to behavior. d. They are a system of rules enforced by a set of institutions that states what a person can and cannot do.

a. They are an individual's beliefs about right and wrong.

34. PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a _____. a. cookie b. metadata c. data dictionary d. popup

a. cookie

18. ZoomMe is a company that accumulates data on people from various sources such as online product registration forms, credit card purchases, and other public records. It then uses these data to create profiles on people and sell them to advertisers. ZoomMe comes under the category of _____. a. data brokers b. data miners c. privacy analysts d. privacy brokers

a. data brokers

6. John, a lawyer, defends his client, who is accused of murder, to the best of his ability while conforming to the _____ of his profession. a. ethics b. morals c. laws d. values

a. ethics

50. The digital divide must be bridged to _____. a. solve emergency issues b. support net neutrality c. prevent online threats d. promote Internet censorship

a. solve emergency issues

62. Fly thermostat, an automatic temperature controller for homes, learns the patterns for raising and lowering the temperature in a house after a week of use. It then adjusts the temperature automatically based on the observed patterns. This is an application of _____. a. the Internet of Things b. Net neutrality c. the Education Rate (E-Rate) program d. Net censorship

a. the Internet of Things

7. Which of the following is true of the First Amendment to the U.S. Constitution? a. It was adopted to protect Americans from unreasonable searches and seizures of properties. b. It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment. c. It was adopted to guarantee fair trial and other rights of the accused. d. It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble.

d. It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble.

51. Which program was designed to eliminate the digital divide in the United States? a. The Internet traffic program b. Net neutrality program c. Workplace monitoring program d. The Education Rate program

d. The Education Rate program

64. Which of the following encompasses machine-to-machine, people-to-people, and people-to-machine connections? a. The Internet of Things b. The Internet of Digital divide c. The Internet of Regulations d. The Internet of Everything

d. The Internet of Everything

58. Identify the objective of the Communications Act of 1934. a. To provide dial-up Internet services to schools and libraries b. To protect users from online threats such as cracking and identity theft c. To restrict the use of social networking Web sites d. To ensure broad access to affordable communications services

d. To ensure broad access to affordable communications services

40. A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email, Internet, and phone usage were not private and that their use might be monitored. a. public b. nonprofit c. voluntary d. private

d. private

63. The Mishiba Huya LED bulbs enable consumers to control lighting in their homes using a smartphone or tablet. When connected to a Huya wireless bridge, the bulbs can be programmed to emit different tones of white light, from warm, yellow white to vibrant, blue white—any color on the spectrum. The bulbs can also be programmed to blink if they sense an intruder. This is an application of _____. a. Net censorship b. Net neutrality c. the Education Rate (E-Rate) program d. the Internet of Things

d. the Internet of Things

1. Ethics is one's personal beliefs about right and wrong.

false

2. Morals is a set of beliefs about right and wrong behavior.

false

4. The First Amendment to the U.S. Constitution was adopted to protect people from unreasonable searches and seizures of properties.

false

5. The Fourth Amendment to the U.S. Constitution is used to protect the privacy of private employees.

false

6. The state privacy statutes tend to favor private-sector employees over employers.

false

8. Digital divide helps schools and libraries obtain broadband Internet services to advance the availability of educational and informational resources.

false

9. Net neutrality favors Internet traffic from some specific sources than the others.

false

10. The Internet of Things enables people to connect to any device with an on/off switch to a network.

true


Related study sets

Secret Garden Vocabulary - Chapter 15

View Set

Safety/Electricity/All-Hazards Preparedness

View Set

Human Resource Management Chapter 1

View Set

AP Art History - Ch. 7 Roman Art

View Set

Perimenopause and menopause -postmenopause

View Set