Chapter2 Flashcards

1
Q

Ethics carry the sanction of a governing authority.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Secret Service is charged with the detection and arrest of any person committing a U.S. federaloffense relating to computer fraud, as well as false identification crimes

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deterrence is the best method for preventing an illegal or unethical activity. ____________

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ISACA is a professional association with a focus on authorization, control, and security. ___________

A

False- Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Due diligence requires that an organization make a valid and ongoing effort to protect others. __________

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Gramm-Leach-Bliley (GLB) Act (also known as the Financial Services Modernization Act of 1999) contains a number of provisions that affect banks, securities firms, and insurance companies. ___________

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is the responsibility of InfoSec professionals to understand state laws and standards. ____________

A

False-Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

InfraGard began as a cooperative effort between the FBI’s Cleveland field office and local intelligence professionals. _________

A

False-Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy. _____________

A

False-Aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To protect intellectual property and competitive advantage, Congress passed the Entrepreneur Espionage Act (EEA) in 1996. _____

A

False- Economic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A signaling law specifies a requirement for organizations to notify affected parties when they have experienced a specified type of loss of information. ____

A

False- breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which subset of civil law regulates the relationships among individuals and among individuals and organizations? a. tort b. criminal c. private d. public

A

C- private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which law addresses privacy and security concerns associated with the electronic transmission of PHI? a. USA Patriot Act of 2001 b. American Recovery and Reinvestment Act c. Health Information Technology for Economic and Clinical Health Act d. National Information Infrastructure Protection Act of 1996

A

C- Health IT for Economic and Clinical health Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following? a. For purposes of commercial advantage b. For private financial gain c. For political advantage d. In furtherance of a criminal act

A

C- for political advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federalcomputer system? a. The Telecommunications Deregulation and Competition Act b. National Information Infrastructure Protection Act c. Computer Fraud and Abuse Act d. The Computer Security Act

A

d.- The Computer Security Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which act is a collection of statutes that regulates the interception of wire, electronic, and oral communications? a. The Electronic Communications Privacy Act of 1986 b. The Telecommunications Deregulation and Competition Act of 1996 c. National Information Infrastructure Protection Act of 1996 d. Federal Privacy Act of 1974

A

A- The Electronic Communication Privacy act of 1986

17
Q

Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information, as well as policies and procedures to maintain them? a. ECPA b. Sarbanes-Oxley c. HIPAA d. Gramm-Leach-Bliley

18
Q

Which law extends protection to intellectual property, which includes words published in electronic formats? a. Freedom of Information Act b. U.S. Copyright Law c. Security and Freedom through Encryption Act d. Sarbanes-Oxley Act

A

B- U.S Copyright Law

19
Q

Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics? a. Applied ethics b. Meta-ethics c. Normative ethics d. Deontological ethics

A

D- Deontological ethics

20
Q

Which of the following is an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially via the removal of technological copyright protection measures? a. U.S. Copyright Law b. PCI DSS c. European Council Cybercrime Convention d. DMCA

21
Q

Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right? a. Applied ethics b. Descriptive ethics c. Normative ethics d. Deontological ethics

A

B- Descriptive Ethics

22
Q

Which ethical standard is based on the notion that life in community yields a positive outcome for the individual, requiring each individual to contribute to that community? a. utilitarian b. virtue c. fairness or justice d. common good

A

D-Common Good

23
Q

There are three general categories of unethical behavior that organizations and society should seek to eliminate. Which of the following is NOT one of them? a. ignorance b. malice c. accident d. intent

24
Q

Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls. a. remediation b. deterrence persecution d. rehabilitation

A

B- deterrence

25
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications? The code includes the canon: Provide diligent and competent service to principals. a. (ISC)2 b. ACM c. SANS d. ISACA
A- (ISC)^2
26
Which of the following is compensation for a wrong committed by an employee acting with or without authorization? a. liability b. restitution c. due diligence d. jurisdiction
B- Restitution
27
Any court can impose its authority over an individual or organization if it can establish which of the following? a. jurisprudence b. jurisdiction c. liability d. sovereignty
B- jurisdiction
28
____________ is a subset of civil law that allows individuals to seek redress in the event of personal, physical, or financial injury.
Tort law
29
Ethics are based on ___________________, which are the relatively fixed moral attitudes or customs of a societal group.
Cultural mores
30
An organization increases its _____________ if it refuses to take measures—due care—to make sure that every employee knows what is acceptable and what is not, and the consequences of illegal or unethical actions.
Liability
31
Information ____________ occurs when pieces of non-private data are combined to create information that violates privacy.
Aggregation
32
The act of attempting to prevent an unwanted action by threatening punishment or retaliation on the instigator if the act takes place is known as ____
Deterrence
33
The branch of philosophy that considers nature, criteria, sources, logic, and the validity of moral judgment is known as _________
Ethics