Question: Question 56 Software license infringement is also often called software _____. Blank 1 Blank 1 Add your answer Question 57 Question 57 1.14 Points Question
Question 56
Software license infringement is also often called software _____.
Blank 1
Blank 1
Add your answer
Question 57
Question 57
1.14
Points
Question 57
The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____.
Option A
ransoming
Option B
non-criminal fraud
Option C
identity theft
Option D
identity extortion
Question 58
Question 58
1.14
Points
Question 58
The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research.
True
False
Question 59
Question 59
1.14
Points
Question 59
According to the 1999 international study of computer-use ethics, many people from many cultural backgrounds indicated that unless an organization explicitly forbids _____ use of its computing resources, such use is acceptable
Blank 1
Blank 1
Add your answer
Question 60
Question 60
1.14
Points
Question 60
Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?
Option A
Health Insurance Portability and Accountability Act
Option B
Computer Security Act
Option C
Financial Services Modernization Act
Option D
Communications Act
Question 61
Question 61
1.14
Points
Question 61
The Council of Europe Convention on Cybercrime has not been well received by advocates of intellectual property rights because it de-emphasizes prosecution for copyright infringement.
True
False
Question 62
Question 62
1.14
Points
Question 62
The Department of Homeland Security was created in 2003 by the 9/11 Memorial Act of 2002. _____
True
False
Question 63
Question 63
1.14
Points
Question 63
In 2001, the Council of Europe drafted the European Council Cybercrime Convention, which empowers an international task force to oversee a range of security functions associated with _____ activities.
Option A
online terrorist
Option B
cyberactivist
Option C
Internet
Option D
electronic commerce
Question 64
Question 64
1.14
Points
Question 64
A key difference between a policy and a law is that ignorance of a law is an acceptable defense.
True
False
Question 65
Question 65
1.14
Points
Question 65
The _____ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.
Blank 1
Blank 1
Add your answer
Question 66
Question 66
1.14
Points
Question 66
_____ is the legal obligation of an entity that extends beyond criminal or contract law.
Blank 1
Blank 1
Add your answer
Question 67
Question 67
1.14
Points
Question 67
In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____.
Option A
provide security awareness training
Option B
periodic assessment of risk
Option C
develop policies and procedures based on risk assessments
Option D
all of the other answers are correct
Question 68
Question 68
1.14
Points
Question 68
The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; maintains a secure Web site for communication about suspicious activity or intrusions; sponsors local chapter activities; and operates a help desk for questions. _____
True
False
Question 69
Question 69
1.14
Points
Question 69
_____ is a professional association that focuses on auditing, control, and security. The membership comprises both technical and managerial professionals.
Option A
SANS
Option B
ISACA
Option C
EC-Council
Option D
Information Systems Security Association (ISSA)
Question 70
Question 70
1.14
Points
Question 70
The communications networks of the United States carry(ies) more funds than all of the armored cars in the world combined. _____
True
False
Question 71
Question 71
1.14
Points
Question 71
Cultural differences can make it difficult to determine what is ethical and not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal.
True
False
Question 72
Question 72
1.14
Points
Question 72
The _____ attempts to prevent trade secrets from being illegally shared.
Option A
Electronic Communications Privacy Act
Option B
Sarbanes-Oxley Act
Option C
Financial Services Modernization Act
Option D
Economic Espionage Act
Question 73
Question 73
1.14
Points
Question 73
The _____ Act seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of corporate governance, in publicly traded companies.
Blank 1
Blank 1
Add your answer
Question 74
Question 74
1.14
Points
Question 74
What is the subject of the Computer Security Act of 1987?
Option A
Federal agency information security
Option B
Cryptography software vendors
Option C
All of the other answers are correct
Option D
Telecommunications common carriers
Question 75
Question 75
1.14
Points
Question 75
The _____ Act of 1996 attempts to prevent trade secrets from being illegally shared.
Blank 1
Blank 1
Add your answer
Question 76
Question 76
1.14
Points
Question 76
Ethics are the moral attitudes or customs of a particular group. _____
True
False
Question 77
Question 77
1.14
Points
Question 77
"Long arm _____" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems whenever it can establish jurisdiction.
Blank 1
Blank 1
Add your answer
Question 78
Question 78
1.14
Points
Question 78
The Computer _____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.
Option A
Theft
Option B
Violence
Option C
Fraud
Option D
Usage
Question 79
Question 79
1.14
Points
Question 79
Intellectual privacy is recognized as a protected asset in the United States. _____
True
False
Question 80
Question 80
1.14
Points
Question 80
The _____ defines stiffer penalties for prosecution of terrorism-related activities.
Option A
Economic Espionage Act
Option B
Gramm-Leach-Bliley Act
Option C
Sarbanes-Oxley Act
Option D
USA PATRIOT Act
Question 81
Question 81
1.14
Points
Question 81
Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present?
Option A
All of the other answers are correct
Option B
Probability of being caught
Option C
Fear of penalty
Option D
Probability of penalty being administered
Question 82
Question 82
1.14
Points
Question 82
The _____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.
Option A
Security and Freedom through Encryption Act
Option B
Prepper Act
Option C
Economic Espionage Act
Option D
USA PATRIOT Act
Question 83
Question 83
1.14
Points
Question 83
The Secret Service is charged with safeguarding the nation's financial infrastructure and payments systems to preserve the integrity of the economy.
True
False
Question 84
Question 84
1.14
Points
Question 84
The Digital Millennium Copyright Act is the American law created in response to Directive 95/46/EC, adopted in 1995 by the European Union. _____
True
False
Question 85
Question 85
1.14
Points
Question 85
The National Information Infrastructure Protection Act of 1996 modified which act?
Option A
USA PATRIOT Improvement and Reauthorization Act
Option B
Computer Fraud and Abuse Act
Option C
Computer Security Act
Option D
USA PATRIOT Act
Question 86
Question 86
1.14
Points
Question 86
The _____ Act of 1986 is a collection of statutes that regulates the interception of wire, electronic, and oral communications.
Blank 1
Blank 1
Add your answer
Question 87
Question 87
1.14
Points
Question 87
_____ are the fixed moral attitudes or customs of a particular group.
Blank 1
Blank 1
Add your answer
Question 88
Question 88
1.14
Points
Question 88
The Graham-Leach-bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms. _____
True
False
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
