Deck 2: Compliance: Law and Ethics

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is an international effort to reduce the impact of copyright,trademark, and privacy infringement,especially via the removal of technological copyright protection measures?

A) U.S. Copyright Law
B) PCI DSS
C) European Council Cybercrime Convention
D) DMCA
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?

A) ECPA
B) Sarbanes-Oxley
C) HIPAA
D) Gramm-Leach-Bliley
سؤال
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications?

A) The Electronic Communications Privacy Act of 1986
B) The Telecommunications Deregulation and Competition Act of 1996
C) National Information Infrastructure Protection Act of 1996
D) Federal Privacy Act of 1974
سؤال
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?

A) Applied ethics
B) Meta-ethics
C) Normative ethics
D) Deontological ethics
سؤال
InfraGard began as a cooperative effortbetween the FBI's Cleveland field office and local intelligence ​professionals. ___________
سؤال
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?

A) For purposes of commercial advantage
B) For private financial gain
C) For political advantage
D) In furtherance of a criminal act
سؤال
Which law addresses privacy and security concerns associated with the electronic transmission of PHI?

A) USA Patriot Act of 2001
B) American Recovery and Reinvestment Act
C) Health Information Technology for Economic and Clinical Health Act
D) National Information Infrastructure Protection Act of 1996
سؤال
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
سؤال
Ethics carry the sanction of a governing authority.
سؤال
Due diligence requires that an organization make a valid and ongoing effort to protect others.____________
سؤال
To protect intellectual property and competitive advantage,Congress passed the EntrepreneurEspionage Act (EEA)in 1996. ___________
سؤال
Which law extends protection to intellectual property,which includes words published in electronic formats?

A) Freedom of Information Act
B) U.S. Copyright Law
C) Security and Freedom through Encryption Act
D) Sarbanes-Oxley Act
سؤال
A signaling lawspecifies a requirement for organizations tonotify affected parties when they have experienced a specified type of loss of information.____________
سؤال
ISACA is a professional association with a focus on authorization,control,andsecurity.___________
سؤال
It is the responsibility of InfoSec professionals to understand state laws andstandards.____________
سؤال
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management,use,or operation of each federal computer system?

A) The Telecommunications Deregulation and Competition Act
B) National Information Infrastructure Protection Act
C) Computer Fraud and Abuse Act
D) The Computer Security Act
سؤال
The Gramm-Leach-Bliley (GLB)Act (alsoknown as the Financial Services Modernization Act of 1999)contains a number of provisionsthat affect banks,securities firms,and insurance companies.___________
سؤال
Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy._________________________
سؤال
Which subset of civil law regulates the relationships among individuals and among individuals and organizations?

A) tort
B) criminal
C) private
D) public
سؤال
Deterrence is the best method for preventing an illegal or unethical activity.____________
سؤال
Laws and policies and their associated penalties only deter if three conditions are present.What are these conditions?
سؤال
The penalty for violating the National Information Infrastructure Protection Act of 1996 depends on the value of the information obtained and whether the offense is judged to have been committed for one of three reasons.What are those reasons?
سؤال
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?

A) liability
B) restitution
C) due diligence
D) jurisdiction
سؤال
What is the key difference between law an ethics?
سؤال
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community?

A) utilitarian
B) virtue
C) fairness or justice
D) common good
سؤال
The act of attempting to prevent an unwanted action by threatening punishment orretaliation on the instigator if the act takes place is known as ___________.
سؤال
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question,what do others think is right?

A) Applied ethics
B) Descriptive ethics
C) Normative ethics
D) Deontological ethics
سؤال
There are three general categories of unethical behavior that organizations and society should seek to eliminate.Which of the following is NOT one of them?

A) ignorance
B) malice
C) accident
D) intent
سؤال
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)2
B) ACM
C) SANS
D) ISACA
سؤال
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
سؤال
The branch of philosophy that considers nature,criteria,sources,logic,and the validity ofmoral judgment is known as ___________.
سؤال
Describe the Freedom of Information Act.How does its application apply to federal vs.state agencies?
سؤال
Discuss the three general categories of unethical behavior that organizations should try to control.
سؤال
Any court can impose its authority over an individual or organization if it can establish which of the following?

A) jurisprudence
B) jurisdiction
C) liability
D) sovereignty
سؤال
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
سؤال
Information ____________ occurs when pieces of non-private data are combined to createinformation that violates privacy.
سؤال
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices.What are three of these principles?
سؤال
Briefly describe five different types of laws.
سؤال
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
سؤال
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws,policies and technical controls.

A) remediation
B) deterrence
C) persecution
D) rehabilitation
سؤال
A key difference between policy and law is that ignorance of policy is a viable defense.What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
the study of what makes actions right or wrong,also known as moral theory
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
defines socially acceptable behaviors
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
a collection of statutes that regulates the interception of wire,electronic,and oral communications ​
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
an approach that applies moral codes to actions drawn from realistic situations
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
سؤال
Describe three of the five foundations and frameworks of ethics.
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
addresses violations harmful to society and is actively enforced and prosecuted by the state
سؤال
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
focuses on enhancing the security of the critical infrastructure in the United States
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Compliance: Law and Ethics
1
Which of the following is an international effort to reduce the impact of copyright,trademark, and privacy infringement,especially via the removal of technological copyright protection measures?

A) U.S. Copyright Law
B) PCI DSS
C) European Council Cybercrime Convention
D) DMCA
D
2
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?

A) ECPA
B) Sarbanes-Oxley
C) HIPAA
D) Gramm-Leach-Bliley
C
3
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications?

A) The Electronic Communications Privacy Act of 1986
B) The Telecommunications Deregulation and Competition Act of 1996
C) National Information Infrastructure Protection Act of 1996
D) Federal Privacy Act of 1974
A
4
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?

A) Applied ethics
B) Meta-ethics
C) Normative ethics
D) Deontological ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
InfraGard began as a cooperative effortbetween the FBI's Cleveland field office and local intelligence ​professionals. ___________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?

A) For purposes of commercial advantage
B) For private financial gain
C) For political advantage
D) In furtherance of a criminal act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which law addresses privacy and security concerns associated with the electronic transmission of PHI?

A) USA Patriot Act of 2001
B) American Recovery and Reinvestment Act
C) Health Information Technology for Economic and Clinical Health Act
D) National Information Infrastructure Protection Act of 1996
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Ethics carry the sanction of a governing authority.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Due diligence requires that an organization make a valid and ongoing effort to protect others.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
To protect intellectual property and competitive advantage,Congress passed the EntrepreneurEspionage Act (EEA)in 1996. ___________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which law extends protection to intellectual property,which includes words published in electronic formats?

A) Freedom of Information Act
B) U.S. Copyright Law
C) Security and Freedom through Encryption Act
D) Sarbanes-Oxley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
A signaling lawspecifies a requirement for organizations tonotify affected parties when they have experienced a specified type of loss of information.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
ISACA is a professional association with a focus on authorization,control,andsecurity.___________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
It is the responsibility of InfoSec professionals to understand state laws andstandards.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management,use,or operation of each federal computer system?

A) The Telecommunications Deregulation and Competition Act
B) National Information Infrastructure Protection Act
C) Computer Fraud and Abuse Act
D) The Computer Security Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Gramm-Leach-Bliley (GLB)Act (alsoknown as the Financial Services Modernization Act of 1999)contains a number of provisionsthat affect banks,securities firms,and insurance companies.___________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy._________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which subset of civil law regulates the relationships among individuals and among individuals and organizations?

A) tort
B) criminal
C) private
D) public
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Deterrence is the best method for preventing an illegal or unethical activity.____________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Laws and policies and their associated penalties only deter if three conditions are present.What are these conditions?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
The penalty for violating the National Information Infrastructure Protection Act of 1996 depends on the value of the information obtained and whether the offense is judged to have been committed for one of three reasons.What are those reasons?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?

A) liability
B) restitution
C) due diligence
D) jurisdiction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is the key difference between law an ethics?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community?

A) utilitarian
B) virtue
C) fairness or justice
D) common good
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
The act of attempting to prevent an unwanted action by threatening punishment orretaliation on the instigator if the act takes place is known as ___________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question,what do others think is right?

A) Applied ethics
B) Descriptive ethics
C) Normative ethics
D) Deontological ethics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
There are three general categories of unethical behavior that organizations and society should seek to eliminate.Which of the following is NOT one of them?

A) ignorance
B) malice
C) accident
D) intent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)2
B) ACM
C) SANS
D) ISACA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The branch of philosophy that considers nature,criteria,sources,logic,and the validity ofmoral judgment is known as ___________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe the Freedom of Information Act.How does its application apply to federal vs.state agencies?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Discuss the three general categories of unethical behavior that organizations should try to control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Any court can impose its authority over an individual or organization if it can establish which of the following?

A) jurisprudence
B) jurisdiction
C) liability
D) sovereignty
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Information ____________ occurs when pieces of non-private data are combined to createinformation that violates privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices.What are three of these principles?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Briefly describe five different types of laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws,policies and technical controls.

A) remediation
B) deterrence
C) persecution
D) rehabilitation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
A key difference between policy and law is that ignorance of policy is a viable defense.What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
the study of what makes actions right or wrong,also known as moral theory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
defines socially acceptable behaviors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
a collection of statutes that regulates the interception of wire,electronic,and oral communications ​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
an approach that applies moral codes to actions drawn from realistic situations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe three of the five foundations and frameworks of ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
addresses violations harmful to society and is actively enforced and prosecuted by the state
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
focuses on enhancing the security of the critical infrastructure in the United States
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.