Ans Doc287Y

CLICK HERE TO DOWNLOAD THIS ANSWER INSTANTLY

1. (TCO 4) _____ requires the data collector to get specific permission from a consumer before collecting any of his or her data. (Points : 4)
Opt-in
Opt-out
Opt-gate
Opt-access
None of the above

3. (TCO 4) The term _____ was made by The Federal Networking Council (FNC). (Points : 4)
firewall
computer virus
CERT
Internet
W3C

4. (TCO 4) What percentage of computer crimes are caused by people within the organization? (Points : 4)
5-25%
26-40%
41-60%
61-84%
85%-95%

5. (TCO 2) _____ generally defines what society thinks is right and wrong. (Points : 4)
Police
Lawyers
Morality
Judges
Senate and House of Representatives

6. (TCO 2) Age, _____, ethnic background, and religion can affect morality. (Points : 4)
looks
democracy
society
species
cultural group

7. (TCO 2) The Federal Communications Commission (FCC) ruled that the _____ program would be supported with up to $2.25 billion per year from a fee charged to telephone customers. (Points : 4)
Media Lab
E-Rate
Ed Tech
No Child Left Behind
None of the above

8. (TCO 2) Every society has _____ that contains boundaries of what the people deem as generally accepted behavior. (Points : 4)
law books
judges
police officers
a set of rules
None of the above

9. (TCO 2) Social audits are tasked with identifying _____ and how to avoid similar future mistakes. (Points : 4)
poor employee hire choices
poor marketing choices
past system choices
past vendor mistakes
past mistakes

10. (TCO 2) _____ is the evaluation of how the policies affect the benefits burdens. (Points : 4)
Virtues
Views
Laws
Unitarian views
Fairness

11. (TCO 5) US-CERT stands for _____. (Points : 4)
United States Computer Evaluation Roaming Team
United States Computer Emergency Response Team
United States Computer Exclusion Reporting Team
United States Computer Emergency Readiness Team
United States Computer Evaluation Readiness Team

12. (TCO 5) Which of the following terms is best used to describe works of the mind such as art, books, films, formulae, inventions, music, and processes that are distinct and that are owned or created by a single entity? (Points : 4)
Intellectual property
Intangible property
Prior art
Patented property
None of the above

13. (TCO 5) US-CERT is charged with protecting the national infrastructure of the Internet by coordinating defenses against Internet attacks. Specific responsibilities include _____. (Points : 4)
analyzing and reducing cyber threats
analyzing and reducing cyber vulnerabilities
disseminating cyber threat warnings
incident response activities
All of the above

14. (TCO 1) One approach to acting with _____ is to extend to all people the same respect and consideration that you desire. (Points : 4)
privacy
integrity
efficiency
sufficiency
None of the above

15. (TCO 1) Moral standards should be applied _____ for any situation or person involved. (Points : 4)
according to the time required
higher
differently
consistently
None of the above

16. (TCO 6) The presence or absence of the BBB Online or _____ seal enables users to make more informed decisions about whether or not to release personal information (i.e., phone numbers, addresses, and credit card numbers) to a website. (Points : 4)
TRUTH
TRYe
TRUSTe
TRUST
None of the above

17. (TCO 6) Although people have the right to express opinions, they must exercise care in their Internet communications to avoid possible charges of _____. (Points : 4)
defamation
slander
declamation
declaration
None of the above

18. (TCO 6) In order to comply with the Children’s Online Protection Act (COPA), website owners or authors must _____. (Points : 4)
not advertise using banner ads
disable cookies in browsers
restrict the use of search engines
receive parental consent before collecting any personal information from children under 18 years of age
receive parental consent before collecting any personal information from children under 13 years of age

19. (TCO 6) The _____ can be a deterrent in fighting the dissemination of pornography. (Points : 4)
Telecommunications Deregulation Reformatory Act
Online Web Surfing Decency Act (OWSDA)
Microsoft Internet Protection Act (MPA)
CAN-SPAM Act
B and C

20. (TCO 6) The _____ was designed to prevent terrorist acts from occurring in the United States and around the world. (Points : 4)
Bill of Rights
U.S. Constitution
Patriot Act
First Amendment
HIPPA
1. (TCO 10) The types of information IT security guard against are _____, customer, and employee information. (Points : 4)
hardware (tangibles)
confidential business
software (system and canned)
network (all)
resource allocation

2. (TCO 10) One security technique for reducing the potential for online credit card fraud is to ask for a(n) _____, which is the three-digit number above the signature panel on the back of a credit card. (Points : 4)
card verification value (CVV)
security access number (ASN)
identity verification value (IVV)
cardholder security code (CSC)

3. (TCO 10) When sued for _____, a software supplier is not held responsible for every product defect that causes customer or third-party loss. (Points : 4)
process violation
distributor error
negligence
strict liability
product liability

4. (TCO 10) When evaluating IT security, _____, pursuing criminal prosecution, recall of defective software, and actions to gather information on competitors without compromising ethics and laws are factors. (Points : 4)
time and expense
discovering information
employee relations
international laws
legal limitations

5. (TCO 7) The _____ allows the public to more easily obtain government records. (Points : 4)
Freedom of Information Act
U.S. Constitution
Homeland Security Act
HIPPA
None of the above

6. (TCO 7) _____ was designed to protect personal privacy. (Points : 4)
Corporate code of conduct
United States Constitution
Ethics
Morals
None of the above

7. (TCO 7) A(n) _____ is software that can be installed with a Web browser to block access to certain websites that contain inappropriate or offensive material. (Points : 4)
Internet modem
gateway
switch
Internet filter
None of the above

8. (TCO 7) RSA is a public key encryption algorithm that has been available since _____. (Points : 4)
1934
1955
1978
1999
None of the above

9. (TCO 8) A _____ law may assist in safeguarding proprietary information that is critical to an organization’s success. (Points : 4)
intellectual property statement
patent
trade secret
copyright
ownership clause

10. (TCO 8) Copyright and patent laws are defined under: (Points : 4)
the Bill of Rights.
INTERPOL trade laws.
the First Amendment.
NATO laws.
None of the above

11. (TCO 8) The fair use doctrine: (Points : 4)
allows anyone to use copyrighted material, as long as it is properly cited.
defines how copyrighted work can be protected while allowing the public to use this work.
prohibits the use of copyrighted material.
affords ownership to anyone paying for the Copyright Office.
All of the above

12. (TCO 8) _____ is a term used to describe works of the mind, such as art, books, films, formulas, inventions, music, and processes that are distinct and “owned” or created by a single person or group. (Points : 4)
Copyright
Trademark
Intellectual property
Rights management
Patent

13. (TCO 9) A(n) _____ takes place before the security community or a software developer knows about a vulnerability or has been able to repair it. (Points : 4)
spider attack
zero-day attack
abort attack
treacherous attack
developer target attack

14. (TCO 9) A(n) _____ is a type of program that is most often spread to others that can destroy things. (Points : 4)
denial of service
improperly operating piece of hardware
incorrectly terminating system
computer virus
firewall

15. (TCO 9) _____ are one of the greatest computer security threats per CERT. (Points : 4)
Corporate raiders
Software manufacturers
Hardware manufacturers
Network intruders
All of the above

16. (TCO 9) _____ researches, develops, and coordinates efforts into computer security issues. (Points : 4)
FEMA
Computer Emergency Response Team Coordination Center (CERT/CC)
Homeland Security
The President
All of the above

17. (TCO 3) _____ provide(s) a definition for a person “employed in a professional capacity.” (Points : 4)
The U.S. Constitution
The U.S. Code of Federal Regulations
State laws
NATO
All of the above

18. (TCO 3) In 1993, the _____ formed a joint steering committee for the establishment of software engineering as a profession. (Points : 4)
IEEE-CS and the ACM
IEEE-CS and AITP
ACM and AITP
IEEE-CS, ACM, and AITP
None of the above

19. (TCO 3) A(n) _____ can be classified as information not known to the general public, information a business wants to keep secret, and information for a business to have a competitive advantage. (Points : 4)
intellectual property
patent
trade secret
All of the above

20. Some who reports negligent, illegal, unethical, abusive, or dangerous acts by a company that threatens the public interest is known as a _____, who is protected from employer retribution by law and policy. (Points : 4)
spy
phisher
whistle-blower
company insider
None of the above