Deck 10: Cyber Security Policies and Legal Issues

ملء الشاشة (f)
exit full mode
سؤال
Which of the following critical infrastructures was NOT a focus of the Network and Information Security Directive?

A) energy
B) health
C) finance
D) education
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
______ has become one of the most feared threats to cybersecurity.

A) Malware
B) Botnet
C) Ransomware
D) Honeypots
سؤال
The ______ creates a cybersecurity information sharing system for public and private entities.

A) Cybersecurity Workforce Act of 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
سؤال
Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of ______.

A) identifying sensitive information
B) assessing vulnerabilities, cyberresiliency, and developing a security baseline
C) determining who has access
D) developing and disseminating ground rules and accountability A Holistic Approach to Cybersecurity steps
سؤال
The ______ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the threat of a cyberwar.

A) EU Network and Information Security Directive
B) Budapest Convention on Cybersecurity
C) UN Convention on the Law of the Sea
D) US Freedom Act
سؤال
The ______ provided the basis for a comprehensive cyber security strategy.

A) Cybersecurity Workforce Act of 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
سؤال
A holistic approach to cybersecurity involves cooperation between all of the following except ______.

A) industries, lawmakers, and cybersecurity specialists
B) lawmakers, citizens, and industries
C) citizens, lawmakers, and cybersecurity specialists
D) cybersecurity specialists, industries, and citizens
سؤال
The ______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce.

A) Cybersecurity Workforce Act 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
سؤال
In 2016, the European Union passed the ______ establishing the first actual cybersecurity rules.

A) Network and Information Security Directive
B) Budapest Convention on Cybersecurity
C) UN Convention on the Law of the Sea
D) EU Freedom Act
سؤال
The ______ gives government the authority to collect content records related to telephonic activities.

A) Cybersecurity Workforce Act
B) USA PATRIOT Act
C) US Freedom Act
D) Cybersecurity Information Sharing Act
سؤال
Examples of proprietary information include all of the following except ______.

A) trade secrets
B) hardware
C) company research
D) public records
سؤال
The ______ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014.

A) secretary of defense
B) secretary of labor
C) secretary of state
D) secretary of transportation
سؤال
Jeopardizing the security, integrity, confidentiality, or availability of an information system or network or any information stored on, processed on, or transiting such a system is also referred to as a ______.

A) cyberincident
B) cybercall
C) cyberwarfare
D) cybercheck
سؤال
A health tracker is an example of a device that can be used in the ______ technique.

A) Man-in-the-cloud
B) Man-in-the-middle
C) Man-in-the-app
D) Man-in-the-IoT
سؤال
In 2016 a massive denial-of-service attack brought down much of the Internet in Europe and the United States. The attack used a ______.

A) botnet
B) phishing email
C) worm
D) Trojan horse
سؤال
Telephonic activities were defined much broader than most people would have expected by the ______.

A) Federal Bureau of Investigation
B) Central Intelligence Agency
C) National Security Agency
D) Defense Intelligence Agency
سؤال
The ______ enables the secretary of homeland security to conduct cybersecurity activities that will defend, mitigate, respond to, or recover from cyberincidents to critical infrastructures.

A) Cybersecurity Workforce Act 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
سؤال
A holistic approach integrates all of the following factors except ______.

A) environmental
B) human
C) technological
D) physical
سؤال
The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following except the ______.

A) director of national intelligence
B) secretary of homeland security
C) president
D) attorney general
سؤال
The ______ prohibited the bulk collection of digital information.

A) US Freedom Act
B) Cybersecurity Workforce Act
C) USA PATRIOT Act
D) Cybersecurity Information Sharing Act
سؤال
The U.S. Foreign Intelligence Surveillance Court is a secret court.
سؤال
Taking a computer or device hostage until the owner pays a ransom is referred to as ransomware.
سؤال
Explain the holistic approach to cybersecurity. How can it help improve cybersecurity? How does it differ from other approaches currently used by law enforcement?
سؤال
The uncontrollable nature of ______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts.

A) private corporations
B) social media
C) public
D) government
سؤال
Edward Snowden, who released classified information about the U.S. government, found asylum in ______, which has declined to extradite Snowden.

A) Sweden
B) France
C) Ukraine
D) Russia
سؤال
The holistic approach emphasizes that technology and policies can effectively address the myriad of cyberthreats.
سؤال
Every nation-state is a sovereign entity; that is, only law enforcement in that nation has the right to enforce the laws.
سؤال
The main purpose of national cybersecurity policies is to develop a comprehensive strategy to prevent and mitigate cyberattacks.
سؤال
Explain cyber incidents. Provide examples.
سؤال
According to the text, it is extremely difficult to do which of the following?

A) investigate cybercriminals
B) punish cybercriminals
C) prosecute cybercriminals
D) all of these
سؤال
A cybercall is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network.
سؤال
What is the law of the sea and how can it help answer some of the questions concerning jurisdiction?
سؤال
Due to the simple nature of cyberspace and geopolitical relations, there is international cybersecurity law, similar to that of the criminal law in the United States.
سؤال
Cyberspace and cybersecurity are confined within national borders.
سؤال
The holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats.
سؤال
Discuss the implications concerning protections from unreasonable search and seizure of private communications sent via third party. What are the arguments for and against?
سؤال
Why are there no international cybersecurity policies that apply to all nations?
سؤال
Attribution is a problem that governments across the globe face when such attacks occur.
سؤال
Some people have suggested applying the ______ to cybercrimes, because they are similar in that there is often no clear jurisdiction.

A) Law of the Sea
B) Law of the Land
C) Law of the Air
D) Law of the Ocean
سؤال
This difference in ______ convictions greatly hampers the development of universal enforcement rules.

A) political
B) moral
C) constitutional
D) all of these
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Cyber Security Policies and Legal Issues
1
Which of the following critical infrastructures was NOT a focus of the Network and Information Security Directive?

A) energy
B) health
C) finance
D) education
D
2
______ has become one of the most feared threats to cybersecurity.

A) Malware
B) Botnet
C) Ransomware
D) Honeypots
C
3
The ______ creates a cybersecurity information sharing system for public and private entities.

A) Cybersecurity Workforce Act of 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
D
4
Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of ______.

A) identifying sensitive information
B) assessing vulnerabilities, cyberresiliency, and developing a security baseline
C) determining who has access
D) developing and disseminating ground rules and accountability A Holistic Approach to Cybersecurity steps
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ______ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the threat of a cyberwar.

A) EU Network and Information Security Directive
B) Budapest Convention on Cybersecurity
C) UN Convention on the Law of the Sea
D) US Freedom Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
The ______ provided the basis for a comprehensive cyber security strategy.

A) Cybersecurity Workforce Act of 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
A holistic approach to cybersecurity involves cooperation between all of the following except ______.

A) industries, lawmakers, and cybersecurity specialists
B) lawmakers, citizens, and industries
C) citizens, lawmakers, and cybersecurity specialists
D) cybersecurity specialists, industries, and citizens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
The ______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce.

A) Cybersecurity Workforce Act 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
In 2016, the European Union passed the ______ establishing the first actual cybersecurity rules.

A) Network and Information Security Directive
B) Budapest Convention on Cybersecurity
C) UN Convention on the Law of the Sea
D) EU Freedom Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
The ______ gives government the authority to collect content records related to telephonic activities.

A) Cybersecurity Workforce Act
B) USA PATRIOT Act
C) US Freedom Act
D) Cybersecurity Information Sharing Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Examples of proprietary information include all of the following except ______.

A) trade secrets
B) hardware
C) company research
D) public records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ______ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014.

A) secretary of defense
B) secretary of labor
C) secretary of state
D) secretary of transportation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
Jeopardizing the security, integrity, confidentiality, or availability of an information system or network or any information stored on, processed on, or transiting such a system is also referred to as a ______.

A) cyberincident
B) cybercall
C) cyberwarfare
D) cybercheck
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
A health tracker is an example of a device that can be used in the ______ technique.

A) Man-in-the-cloud
B) Man-in-the-middle
C) Man-in-the-app
D) Man-in-the-IoT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
In 2016 a massive denial-of-service attack brought down much of the Internet in Europe and the United States. The attack used a ______.

A) botnet
B) phishing email
C) worm
D) Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
Telephonic activities were defined much broader than most people would have expected by the ______.

A) Federal Bureau of Investigation
B) Central Intelligence Agency
C) National Security Agency
D) Defense Intelligence Agency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ______ enables the secretary of homeland security to conduct cybersecurity activities that will defend, mitigate, respond to, or recover from cyberincidents to critical infrastructures.

A) Cybersecurity Workforce Act 2014
B) Comprehensive National Cybersecurity Initiative
C) National Cybersecurity and Critical Infrastructure Protection Act of 2014
D) Cybersecurity Information Sharing Act of 2015
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
A holistic approach integrates all of the following factors except ______.

A) environmental
B) human
C) technological
D) physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
The Cybersecurity Information Sharing Act of 2015 calls for the cooperation of all of the following except the ______.

A) director of national intelligence
B) secretary of homeland security
C) president
D) attorney general
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ______ prohibited the bulk collection of digital information.

A) US Freedom Act
B) Cybersecurity Workforce Act
C) USA PATRIOT Act
D) Cybersecurity Information Sharing Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
The U.S. Foreign Intelligence Surveillance Court is a secret court.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
Taking a computer or device hostage until the owner pays a ransom is referred to as ransomware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Explain the holistic approach to cybersecurity. How can it help improve cybersecurity? How does it differ from other approaches currently used by law enforcement?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
The uncontrollable nature of ______ poses great challenges to coordinating effective federal and state law enforcement responses to cyberattacks and terrorist acts.

A) private corporations
B) social media
C) public
D) government
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Edward Snowden, who released classified information about the U.S. government, found asylum in ______, which has declined to extradite Snowden.

A) Sweden
B) France
C) Ukraine
D) Russia
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
The holistic approach emphasizes that technology and policies can effectively address the myriad of cyberthreats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
Every nation-state is a sovereign entity; that is, only law enforcement in that nation has the right to enforce the laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
The main purpose of national cybersecurity policies is to develop a comprehensive strategy to prevent and mitigate cyberattacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Explain cyber incidents. Provide examples.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
According to the text, it is extremely difficult to do which of the following?

A) investigate cybercriminals
B) punish cybercriminals
C) prosecute cybercriminals
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
A cybercall is defined as an incident, or an attempt to cause an incident, that if successful would deny access to or degrade, disrupt, or destruct such a system or network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is the law of the sea and how can it help answer some of the questions concerning jurisdiction?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Due to the simple nature of cyberspace and geopolitical relations, there is international cybersecurity law, similar to that of the criminal law in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Cyberspace and cybersecurity are confined within national borders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
The holistic approach emphasizes that neither technology nor policies in themselves can effectively address the myriad of cyberthreats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
Discuss the implications concerning protections from unreasonable search and seizure of private communications sent via third party. What are the arguments for and against?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
Why are there no international cybersecurity policies that apply to all nations?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
Attribution is a problem that governments across the globe face when such attacks occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
Some people have suggested applying the ______ to cybercrimes, because they are similar in that there is often no clear jurisdiction.

A) Law of the Sea
B) Law of the Land
C) Law of the Air
D) Law of the Ocean
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
This difference in ______ convictions greatly hampers the development of universal enforcement rules.

A) political
B) moral
C) constitutional
D) all of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.