Reading Quiz #7
D.
Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks? A. Focus on how to respond to a breach. B. Involvement by all functional departments. C. Support from executive leadership. D. All of the above.
x
In the U.S., the right to free speech: a. Must be weighed against the consequences for the community. b. Is a constant threat to every business. c. Is an absolute privilege to all citizens. d. Depends on state law.
x
Intellectual property refers to: A. Protecting one's ideas, concepts, and symbolic creations. B. Prohibiting the downloading of commercial software or videogames. C. Special laws protecting copyrights, patents, and trademarks. D. All of the above.
A.
M-Commerce is facilitated primarily by: A. Mobile or cell phones. B. Lap-tops. C. The government. D. Personal computers.
D.
Most U.S. state laws permit the monitoring of employees through: A. Eavesdropping on phone calls. B. Tracking software. C. Recording computer keystrokes. D. All of the above.
C.
The practice of using fake business emails in order to trick users into divulging personal data, such as usernames and passwords, is called: A. Pharming. B. Tweeting. C. Phishing. D. Censorship.
C.
The primary reason that governments try to keep pace with technology is to: A. Avoid threats to individuals. B. Manage the cost of technology. C. Ensure that the public is protected. D. Control the speed of innovation.
D.
The use of robotics in the workplace has increased recently because: A. Robots are more reliable than people. B. The cost of robots has decreased. C. New collaborative machines have been invented. D. All of the above.
B.
Which of these statements accurately describe hacktivists known as grey hatters? A. They are highly welcomed by businesses. B. They seek media attention and profits. C. They seek retaliation on businesses. D. They always work in tight-knit groups.
D.
Which of these steps has the U.S. recently taken to counter cybercrime? A. Setup a system of voluntary cybersecurity standards. B. Opened a new center dedicated to managing cyber activities. C. Passed sweeping new legislation that required Internet providers to guarantee security. D. Both A and B, but not C.