Tuesday, January 14, 2014

CIS 481-20: INTRO TO INFORM SECURITY CH3

  • Question 1

    0 out of 1 points
    Due care requires that an organization make a valid effort to protect others and continually maintain this level of effort.
    Selected Answer:
    Incorrect True
    Correct Answer:
    Correct False
  • Question 2

    2 out of 2 points
    The __________ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.
    Selected Answer:
    Correct 
    Digital Millennium Copyright Act
    Correct Answer:
    Correct Digital Millennium Copyright Act
  • Question 3

    2 out of 2 points
    The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, is an attempt to protect the confidentiality and security of health-care data by establishing and enforcing standards and by standardizing electronic data interchange.
    Selected Answer:
    Correct 
    Health Insurance
    Correct Answer:
    Correct Health Insurance
  • Question 4

    2 out of 2 points
    ____ law addresses activities and conduct harmful to society, and is actively enforced by the state.
    Selected Answer:
    Correct 
    Criminal
    Correct Answer:
    Correct Criminal
  • Question 5

    1 out of 1 points
    Studies on ethics and computer use reveal that individuals of different nationalities have different perspectives; difficulties arise when one nationality’s ethical behavior conflicts with the ethics of another national group.
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 6

    1 out of 1 points
    In the context of US legislation, privacy is not absolute freedom from observation, but rather is a more precise “state of being free from unsanctioned intrusion.”
    Selected Answer:
    Correct True
    Correct Answer:
    Correct True
  • Question 7

    2 out of 2 points
    The __________ states that the U.S. government cannot require the use of any kind of key registration or escrow system for encryption products.
    Selected Answer:
    Correct 
    Security and Freedom Through Encryption Act
    Correct Answer:
    Correct Security and Freedom Through Encryption Act
  • Question 8

    1 out of 1 points
    Every state has implemented uniform laws and regulations placed on organizational use of computer technology.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 9

    2 out of 2 points
    What is the subject of the Sarbanes-Oxley Act?
    Selected Answer:
    Correct 
    Financial Reporting
    Correct Answer:
    Correct Financial Reporting
  • Question 10

    2 out of 2 points
    ____ law represents a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people.
    Selected Answer:
    Correct 
    Civil
    Correct Answer:
    Correct Civil
  • Question 11

    1 out of 1 points
    A key difference between laws and ethics is that ethics carry the sanctions of a governing authority and laws do not.
    Selected Answer:
    Correct False
    Correct Answer:
    Correct False
  • Question 12

    2 out of 2 points
    Laws and policies and their associated penalties only deter if which of the following conditions is present?
    Selected Answer:
    Correct 
    All of the above
    Correct Answer:
    Correct All of the above
  • Question 13

    2 out of 2 points
    Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?
    Selected Answer:
    Correct 
    Computer Fraud and Abuse Act
    Correct Answer:
    Correct Computer Fraud and Abuse Act
  • Question 14

    2 out of 2 points
    A body of expectations that describe acceptable and unacceptable employee behaviors in the workplace is known as ____________________.
    Selected Answer:
    Correct policy
    Correct Answer:
    Evaluation MethodCorrect AnswerCase Sensitivity
    CorrectExact Matchpolicies
    CorrectExact Matchpolicy
  • Question 15

    2 out of 2 points
    The FTC defines __________ theft as "occurring when someone uses your personally identifying information, like your name, Social Security number, or credit card numbers, without your permission, to commit fraud or other crimes."
    Selected Answer:
    Correct identity
    Correct Answer:
    Evaluation MethodCorrect AnswerCase Sensitivity
    CorrectExact Matchidentity

No comments:

Post a Comment