Filters
Question type

Study Flashcards

The United States has implemented a version of the DMCA law called the Database Right,in order to comply with Directive 95/46/EC.

A) True
B) False

Correct Answer

verifed

verified

____ attempts to prevent trade secrets from being illegally shared.


A) Electronic Communications Privacy Act
B) Sarbanes-Oxley Act
C) Financial Services Modernization Act
D) Economic Espionage Act

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Ethics define socially acceptable behaviors._________________________

A) True
B) False

Correct Answer

verifed

verified

The U.S.Secret Service is a department within the Department of the Interior._________________________

A) True
B) False

Correct Answer

verifed

verified

____ defines stiffer penalties for prosecution of terrorist crimes.


A) USA Patriot Act
B) Sarbanes-Oxley Act
C) Gramm-Leach-Bliley Act
D) Economic Espionage Act

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

The _________________________ Act of 1966 allows any person to request access to federal agency records or information not determined to be a matter of national security.

Correct Answer

verifed

verified

Freedom of...

View Answer

Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is ____________________.

Correct Answer

verifed

verified

education

The communications networks of the United States carry more funds than all of the armored cars in the world combined._________________________

A) True
B) False

Correct Answer

verifed

verified

There are four general causes of unethical and illegal behavior.

A) True
B) False

Correct Answer

verifed

verified

The National Information Infrastructure Protection Act of 1996 modified which Act?


A) USA PATRIOT Act
B) USA PATRIOT Improvement and Reauthorization Act
C) Computer Security Act
D) Computer Fraud and Abuse Act

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

HIPAA specifies particular security technologies for each of the security requirements to ensure the privacy of the health-care information.

A) True
B) False

Correct Answer

verifed

verified

____ law comprises a wide variety of laws that govern a nation or state.


A) Criminal
B) Civil
C) Public
D) Private

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Intellectual privacy is recognized as a protected asset in the United States._________________________

A) True
B) False

Correct Answer

verifed

verified

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident.

A) True
B) False

Correct Answer

verifed

verified

What is the subject of the Sarbanes-Oxley Act?


A) Banking
B) Financial Reporting
C) Privacy
D) Trade secrets

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The Federal Privacy Act of 1974 regulates government agencies and holds them accountable if they release information about national security._________________________

A) True
B) False

Correct Answer

verifed

verified

False

What is the subject of the Computer Security Act?


A) Federal Agency Information Security
B) Telecommunications Common Carriers
C) Cryptography Software Vendors
D) Banking Industry

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____.


A) with intent
B) by accident
C) with malice
D) with negligence

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Every state has implemented uniform laws and regulations placed on organizational use of computer technology.

A) True
B) False

Correct Answer

verifed

verified

False

Deterrence can prevent an illegal or unethical activity from occurring._________________________

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 78

Related Exams

Show Answer