SRA111 PreQuiz3

Card Set Information

SRA111 PreQuiz3
2013-12-08 21:00:55
SRA111 PreQuiz3

SRA111 PreQuiz3
Show Answers:

  1. 1.The key difference between laws and ethics is that ethics carry the authority of a governing body and laws do not. (T/F)
    False - Law carry the authority of a governing body, Ethic DON'T
  2. 2.Due care requires that an organization make a valid effort to protect others and continually maintain this level of effort. (T/F)
    False - Due Diligence
  3. 3.HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information. (T/F)
    False - HIPAA not specifies specific technologies
  4. 4.Every state has implemented uniform laws and regulations placed on organizational use of computer technology. (T/F)
    False - Not Uniform
  5. 5.The United States has implemented a version of the DMCA law called the Database Right, in order to comply with Directive 95/46/EC. (T/F)
    False - Database Right = UK
  6. 6.The Association for Computing Machinery and the Information Systems Security Association have the authority to banish violators of their ethical standards from practicing their trade. (T/F)
    False - Not to banish violators
  7. 7.Studies on ethics and computer use reveal that people of different nationalities have different perspectives; difficulties arise when one nationality’s ethical behavior violates the ethics of another national group. (T/F)
  8. 8.Studies have reported that the Pacific Rim countries of Singapore and Hong Kong are hotbeds of software piracy. (T/F)
  9. 9.The difference between a policy and a law is that ignorance of a law is an acceptable defense. (T/F)
    False - Ignorance of Policy is an acceptable defense
  10. 10.The Department of Homeland Security is the only U.S. federal agency charged with the protection of American information resources and the investigation of threats to, or attacks on, the resources. (T/F)
    False - DHS, FBI, NSA & Secret Service
  11. 11.Ethics define socially acceptable behaviors. (T/F)
  12. 12.Civil law addresses activities and conduct harmful to society and is actively enforced by the state. (T/F)
    False - Criminal Law
  13. 13.The Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release information about national security. (T/F)
    False - Individual & business information
  14. 14.Intellectual privacy is recognized as a protected asset in the United States. (T/F)
    False - Intellectual Property
  15. 15.In a study on software licence infringement, those from United States were significantly more permissive. (T/F)
    False - Netherlands
  16. 16.The Department of Homeland Security was created in 1999. (T/F)
    False - 2003
  17. 17.The Federal Bureau of Investigation’s National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; Maintains a secure Web site for communication about suspicious activity or intrusions; Sponsors local chapter activities; Operates a help desk for questions. (T/F)
  18. 18.The U.S. Secret Service is a department within the Department of the Interior. (T/F)
    False - Department of Treasury
  19. 19.The communications networks of the United States carry more funds than all of the armored cars in the world combined. (T/F)
  20. 20.Deterrence can prevent an illegal or unethical activity from occurring. (T/F)
  21. 21.____ law comprises a wide variety of laws that govern a nation or state.
    A) Criminal
    B) Public
    C) Private
    D) Civil
    D) Civil
    (this multiple choice question has been scrambled)
  22. 22.____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.
    A) Public
    B) Private
    C) Civil
    D) Criminal
    A) Public
    (this multiple choice question has been scrambled)
  23. 23.The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.
    A) Usage
    B) Theft
    C) Violence
    D) Fraud
    D) Fraud
    (this multiple choice question has been scrambled)
  24. 24.According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.
    A) for purposes of commercial advantage
    B) for private financial gain
    C) to harass
    D) in furtherance of a criminal act
    C) to harass
    (this multiple choice question has been scrambled)
  25. 25.The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any ____ purposes.
    A) customer service
    B) troubleshooting
    C) billing
    D) marketing
    D) marketing
    (this multiple choice question has been scrambled)
  26. 26.The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
    A) Health Insurance
    B) Telecommunications
    C) Customer
    D) Computer
    A) Health Insurance
    (this multiple choice question has been scrambled)
  27. 27.What is the subject of the Computer Security Act?
    A) Cryptography Software Vendors
    B) Federal Agency Information Security
    C) Telecommunications Common Carriers
    D) Banking Industry
    B) Federal Agency Information Security
    (this multiple choice question has been scrambled)
  28. 28.The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.
    A) Security and Freedom through Encryption Act
    B) U.S.A. Patriot Act
    C) Sarbanes-Oxley Act
    D) Gramm-Leach-Bliley Act
    A) Security and Freedom through Encryption Act
    (this multiple choice question has been scrambled)
  29. 29.Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?
    A) United States
    B) Australia
    C) Sweden
    D) Singapore
    D) Singapore
    (this multiple choice question has been scrambled)
  30. 30.Criminal or unethical ____ goes to the state of mind of the individual performing the act.
    A) attitude
    B) accident
    C) intent
    D) ignorance
    C) intent
    (this multiple choice question has been scrambled)
  31. 31.____________________ are rules that mandate or prohibit certain behavior in society.
  32. 32.Guidelines that describe acceptable and unacceptable employee behaviors in the workplace are known as ____________________.
  33. 33.Family law, commercial law, and labor law are all encompassed by ____________________ law.
  34. 34.The ____________________ Act of 2001 provides law enforcement agencies with broader latitude in order to combat terrorism-related activities.
    USA Patriot
  35. 35.____________________ information is created by combining pieces of non-private data—often collected during software updates, and via cookies—that when combined may violate privacy.
  36. 36.The ________________________________________ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.
    Digital Millenium Copyright Act (DMCA)
  37. 37.The low overall degree of tolerance for ____________________ system use may be a function of the easy association between the common crimes of breaking and entering, trespassing, theft, and destruction of property to their computer-related counterparts.
  38. 38.Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is ____________________.
  39. 39.The ___________________________________ is a respected professional society that was established in 1947 as “the world’s first educational and scientific computing society.”
    Association of Computing Machinery (ACM)
  40. 40.The ________________________________________ Association is a professional association that focuses on auditing, control, and security and whose membership comprises both technical and managerial professionals.
    Information Systems Audit and Control (ISACA)