Deck 24: Legal Issues and Ethics
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
العب
ملء الشاشة (f)
Deck 24: Legal Issues and Ethics
1
The Wassenaar Arrangement can be described as which of the following?
A)An international arrangement on export controls for conventional arms as well as dual-use goods and technologies
B)An international arrangement on import controls
C)A rule governing import of encryption in the United States
D)A rule governing export of encryption in the United States
A)An international arrangement on export controls for conventional arms as well as dual-use goods and technologies
B)An international arrangement on import controls
C)A rule governing import of encryption in the United States
D)A rule governing export of encryption in the United States
A
2
_____________ is the unauthorized entry into a computer system via any means.
A)Computer trespass
B)Computer entry
C)Computer hacking
D)Cyber crime
A)Computer trespass
B)Computer entry
C)Computer hacking
D)Cyber crime
A
3
The CAN-SPAM Act allows unsolicited e-mail as long as there is an unsubscribe link;the content must not be deceptive and not harvest emails.
True
4
Carnivore is an eavesdropping program for the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
What are laws and regulations created by government-sponsored agencies such as the EPA,the FAA,and the FCC?
A)Statutory laws
B)Administrative laws
C)Common laws
D)Blue laws
A)Statutory laws
B)Administrative laws
C)Common laws
D)Blue laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the law that overhauled the financial accounting standards for publicly traded firms in the United States?
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Electronic Communications Privacy Act (ECPA)of 1986
A)Implements the principle that a signature,contract,or other record may not be
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
A)Implements the principle that a signature,contract,or other record may not be
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
Privacy laws in Europe are built around the concept that privacy is not a fundamental human right.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the Gramm-Leach-Bliley Act?
A)Implements the principle that a signature,contract,or other record may not be deleted
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
A)Implements the principle that a signature,contract,or other record may not be deleted
B)Denies legal effect,validity,or enforceability solely because it is electronic form
C)Addresses a myriad of legal privacy issues that were resulting from the increasing use of computers and other technology specific to telecommunications
D)Makes it a violation of federal law to knowingly use another's identity
E)A major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Computer trespass is treated as a crime in many countries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
A principal reference for rules governing the export of encryption can be found in the
A)Bureau of Industry and Security
B)U.S.Department of Commerce
C)Export Administration Regulations
D)State Department
A)Bureau of Industry and Security
B)U.S.Department of Commerce
C)Export Administration Regulations
D)State Department
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
What do you call a law based on previous events or precedents?
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which law makes it illegal to develop,produce,and trade any device or mechanism designed to circumvent technological controls used in copy protection?
A)Sarbanes-Oxley Act
B)Digital Millennium Copyright Act
C)US Digital Signatures Law
D)Computer Fraud and Abuse Act
A)Sarbanes-Oxley Act
B)Digital Millennium Copyright Act
C)US Digital Signatures Law
D)Computer Fraud and Abuse Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
The Patriot Act permits the Justice Department to proceed with its rollout of the Carnivore program,an eavesdropping program for the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
The law that regulates unsolicited commercial e-mail is the
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce,or to use a computer in a crime that is interstate in nature?
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
A)Computer Fraud and Abuse Act
B)Stored Communications Act
C)CAN-SPAM Act
D)Sarbanes-Oxley Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is a law passed by a legislative branch of government called?
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
A)Statutory law
B)Administrative law
C)Common law
D)Blue law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is the Convention on Cybercrime?
A)A convention of black hats who trade hacking secrets
B)The first international treaty on crimes committed via the Internet and other computer networks
C)A convention of white hats who trade hacker prevention knowledge
D)A treaty regulating international conventions
A)A convention of black hats who trade hacking secrets
B)The first international treaty on crimes committed via the Internet and other computer networks
C)A convention of white hats who trade hacker prevention knowledge
D)A treaty regulating international conventions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
The electronic signatures in the Global and National Commerce Act
A)Implement the principle that a signature,contract,or other record may not be denied legal effect,validity,or enforceability solely because it is electronic form
B)Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
C)Make it a violation of federal law to knowingly use another's identity
D)Are a major piece of legislation affecting the financial industry,and contains significant privacy provisions for individuals
A)Implement the principle that a signature,contract,or other record may not be denied legal effect,validity,or enforceability solely because it is electronic form
B)Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications
C)Make it a violation of federal law to knowingly use another's identity
D)Are a major piece of legislation affecting the financial industry,and contains significant privacy provisions for individuals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is a characteristic of the Patriot Act?
A)Extends the tap-and-trace provisions of existing wiretap statutes to the Internet,and mandates certain technological modifications at ISPs to facilitate electronic wiretaps on the Internet
B)A major piece of legislation affecting the financial industry,and also one with significant privacy provisions for individuals
C)Makes it a violation of federal law to knowingly use another's identity
D)Implements the principle that a signature,contract,or other record may not be deleted
E)Denies legal effect,validity,or enforceability solely because it is electronic form
A)Extends the tap-and-trace provisions of existing wiretap statutes to the Internet,and mandates certain technological modifications at ISPs to facilitate electronic wiretaps on the Internet
B)A major piece of legislation affecting the financial industry,and also one with significant privacy provisions for individuals
C)Makes it a violation of federal law to knowingly use another's identity
D)Implements the principle that a signature,contract,or other record may not be deleted
E)Denies legal effect,validity,or enforceability solely because it is electronic form
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are the laws that govern encryption and digital rights management?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
Circumventing technological controls used to protect intellectual properties is a violation of the _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
_______________ is the unauthorized entry into a computer system via any means like remote network connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
_______________ is a set of contractual rules governing how credit card data is to be protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
_______________ involves a piece of malware that defrauds the advertising revenue counter engine through fraudulent user clicks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe the laws that govern digital signatures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
Two laws that provide wide-sweeping tools for law enforcement to convict people who hack into computers-or use them to steal information-are the ECPA and the CFAA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
_______________ allows unsolicited commercial e-mail as long as it adheres to three rules of compliance: unsubscribe,content,and sending behavior compliance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
_______________ technology is used to protect digital rights management and prevent unauthorized use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
The _______________ is a legislation that affects the financial industry that includes significant privacy provisions for individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
What are the laws and regulations regarding the import and export of encryption software?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
The _______________ was designed to establish criminal provisions for access to stored electronic records and communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Falsifying header information is not covered by the CAN-SPAM Act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
The _______________ is an international agreement between countries concerning the import/export of cryptographic software,and has enabled mass-marketed products to generally flow across borders.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are some ethical issues associated with information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
The sale of some types of encryption overseas is illegal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
The DMCA protects the rights of recording artists and the music industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
_______________ have the same legal status as written signatures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
The low risk of being caught is one of the reasons that criminals are turning to computer crime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the laws that govern computer access and trespass?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck

