Question: Question 56 Software license infringement is also often called software _____. Blank 1 Blank 1 Add your answer Question 57 Question 57 1.14 Points Question

Question 56

Software license infringement is also often called software _____.

Blank 1

Blank 1

Add your answer

Question 57

Question 57

1.14

Points

Question 57

The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____.

Option A

ransoming

Option B

non-criminal fraud

Option C

identity theft

Option D

identity extortion

Question 58

Question 58

1.14

Points

Question 58

The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research.

True

False

Question 59

Question 59

1.14

Points

Question 59

According to the 1999 international study of computer-use ethics, many people from many cultural backgrounds indicated that unless an organization explicitly forbids _____ use of its computing resources, such use is acceptable

Blank 1

Blank 1

Add your answer

Question 60

Question 60

1.14

Points

Question 60

Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

Option A

Health Insurance Portability and Accountability Act

Option B

Computer Security Act

Option C

Financial Services Modernization Act

Option D

Communications Act

Question 61

Question 61

1.14

Points

Question 61

The Council of Europe Convention on Cybercrime has not been well received by advocates of intellectual property rights because it de-emphasizes prosecution for copyright infringement.

True

False

Question 62

Question 62

1.14

Points

Question 62

The Department of Homeland Security was created in 2003 by the 9/11 Memorial Act of 2002. _____

True

False

Question 63

Question 63

1.14

Points

Question 63

In 2001, the Council of Europe drafted the European Council Cybercrime Convention, which empowers an international task force to oversee a range of security functions associated with _____ activities.

Option A

online terrorist

Option B

cyberactivist

Option C

Internet

Option D

electronic commerce

Question 64

Question 64

1.14

Points

Question 64

A key difference between a policy and a law is that ignorance of a law is an acceptable defense.

True

False

Question 65

Question 65

1.14

Points

Question 65

The _____ is the American contribution to an international effort to reduce the impact of copyright, trademark, and privacy infringement, especially when accomplished via the removal of technological copyright protection measures.

Blank 1

Blank 1

Add your answer

Question 66

Question 66

1.14

Points

Question 66

_____ is the legal obligation of an entity that extends beyond criminal or contract law.

Blank 1

Blank 1

Add your answer

Question 67

Question 67

1.14

Points

Question 67

In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____.

Option A

provide security awareness training

Option B

periodic assessment of risk

Option C

develop policies and procedures based on risk assessments

Option D

all of the other answers are correct

Question 68

Question 68

1.14

Points

Question 68

The Federal Bureau of Investigation's National InfraGard Program serves its members in four basic ways: Maintains an intrusion alert network using encrypted e-mail; maintains a secure Web site for communication about suspicious activity or intrusions; sponsors local chapter activities; and operates a help desk for questions. _____

True

False

Question 69

Question 69

1.14

Points

Question 69

_____ is a professional association that focuses on auditing, control, and security. The membership comprises both technical and managerial professionals.

Option A

SANS

Option B

ISACA

Option C

EC-Council

Option D

Information Systems Security Association (ISSA)

Question 70

Question 70

1.14

Points

Question 70

The communications networks of the United States carry(ies) more funds than all of the armored cars in the world combined. _____

True

False

Question 71

Question 71

1.14

Points

Question 71

Cultural differences can make it difficult to determine what is ethical and not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal.

True

False

Question 72

Question 72

1.14

Points

Question 72

The _____ attempts to prevent trade secrets from being illegally shared.

Option A

Electronic Communications Privacy Act

Option B

Sarbanes-Oxley Act

Option C

Financial Services Modernization Act

Option D

Economic Espionage Act

Question 73

Question 73

1.14

Points

Question 73

The _____ Act seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of corporate governance, in publicly traded companies.

Blank 1

Blank 1

Add your answer

Question 74

Question 74

1.14

Points

Question 74

What is the subject of the Computer Security Act of 1987?

Option A

Federal agency information security

Option B

Cryptography software vendors

Option C

All of the other answers are correct

Option D

Telecommunications common carriers

Question 75

Question 75

1.14

Points

Question 75

The _____ Act of 1996 attempts to prevent trade secrets from being illegally shared.

Blank 1

Blank 1

Add your answer

Question 76

Question 76

1.14

Points

Question 76

Ethics are the moral attitudes or customs of a particular group. _____

True

False

Question 77

Question 77

1.14

Points

Question 77

"Long arm _____" refers to the long arm of the law reaching across the country or around the world to draw an accused individual into its court systems whenever it can establish jurisdiction.

Blank 1

Blank 1

Add your answer

Question 78

Question 78

1.14

Points

Question 78

The Computer _____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

Option A

Theft

Option B

Violence

Option C

Fraud

Option D

Usage

Question 79

Question 79

1.14

Points

Question 79

Intellectual privacy is recognized as a protected asset in the United States. _____

True

False

Question 80

Question 80

1.14

Points

Question 80

The _____ defines stiffer penalties for prosecution of terrorism-related activities.

Option A

Economic Espionage Act

Option B

Gramm-Leach-Bliley Act

Option C

Sarbanes-Oxley Act

Option D

USA PATRIOT Act

Question 81

Question 81

1.14

Points

Question 81

Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present?

Option A

All of the other answers are correct

Option B

Probability of being caught

Option C

Fear of penalty

Option D

Probability of penalty being administered

Question 82

Question 82

1.14

Points

Question 82

The _____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

Option A

Security and Freedom through Encryption Act

Option B

Prepper Act

Option C

Economic Espionage Act

Option D

USA PATRIOT Act

Question 83

Question 83

1.14

Points

Question 83

The Secret Service is charged with safeguarding the nation's financial infrastructure and payments systems to preserve the integrity of the economy.

True

False

Question 84

Question 84

1.14

Points

Question 84

The Digital Millennium Copyright Act is the American law created in response to Directive 95/46/EC, adopted in 1995 by the European Union. _____

True

False

Question 85

Question 85

1.14

Points

Question 85

The National Information Infrastructure Protection Act of 1996 modified which act?

Option A

USA PATRIOT Improvement and Reauthorization Act

Option B

Computer Fraud and Abuse Act

Option C

Computer Security Act

Option D

USA PATRIOT Act

Question 86

Question 86

1.14

Points

Question 86

The _____ Act of 1986 is a collection of statutes that regulates the interception of wire, electronic, and oral communications.

Blank 1

Blank 1

Add your answer

Question 87

Question 87

1.14

Points

Question 87

_____ are the fixed moral attitudes or customs of a particular group.

Blank 1

Blank 1

Add your answer

Question 88

Question 88

1.14

Points

Question 88

The Graham-Leach-bliley Act is a critical piece of legislation that affects the executive management of publicly traded corporations and public accounting firms. _____

True

False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Law Questions!