Deck 2: Compliance: Law and Ethics

Full screen (f)
exit full mode
Question
Which of the following is an international effort to reduce the impact of copyright,trademark, and privacy infringement,especially via the removal of technological copyright protection measures?

A) U.S. Copyright Law
B) PCI DSS
C) European Council Cybercrime Convention
D) DMCA
Use Space or
up arrow
down arrow
to flip the card.
Question
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?

A) ECPA
B) Sarbanes-Oxley
C) HIPAA
D) Gramm-Leach-Bliley
Question
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications?

A) The Electronic Communications Privacy Act of 1986
B) The Telecommunications Deregulation and Competition Act of 1996
C) National Information Infrastructure Protection Act of 1996
D) Federal Privacy Act of 1974
Question
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?

A) Applied ethics
B) Meta-ethics
C) Normative ethics
D) Deontological ethics
Question
InfraGard began as a cooperative effortbetween the FBI's Cleveland field office and local intelligence ​professionals. ___________
Question
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?

A) For purposes of commercial advantage
B) For private financial gain
C) For political advantage
D) In furtherance of a criminal act
Question
Which law addresses privacy and security concerns associated with the electronic transmission of PHI?

A) USA Patriot Act of 2001
B) American Recovery and Reinvestment Act
C) Health Information Technology for Economic and Clinical Health Act
D) National Information Infrastructure Protection Act of 1996
Question
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
Question
Ethics carry the sanction of a governing authority.
Question
Due diligence requires that an organization make a valid and ongoing effort to protect others.____________
Question
To protect intellectual property and competitive advantage,Congress passed the EntrepreneurEspionage Act (EEA)in 1996. ___________
Question
Which law extends protection to intellectual property,which includes words published in electronic formats?

A) Freedom of Information Act
B) U.S. Copyright Law
C) Security and Freedom through Encryption Act
D) Sarbanes-Oxley Act
Question
A signaling lawspecifies a requirement for organizations tonotify affected parties when they have experienced a specified type of loss of information.____________
Question
ISACA is a professional association with a focus on authorization,control,andsecurity.___________
Question
It is the responsibility of InfoSec professionals to understand state laws andstandards.____________
Question
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management,use,or operation of each federal computer system?

A) The Telecommunications Deregulation and Competition Act
B) National Information Infrastructure Protection Act
C) Computer Fraud and Abuse Act
D) The Computer Security Act
Question
The Gramm-Leach-Bliley (GLB)Act (alsoknown as the Financial Services Modernization Act of 1999)contains a number of provisionsthat affect banks,securities firms,and insurance companies.___________
Question
Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy._________________________
Question
Which subset of civil law regulates the relationships among individuals and among individuals and organizations?

A) tort
B) criminal
C) private
D) public
Question
Deterrence is the best method for preventing an illegal or unethical activity.____________
Question
Laws and policies and their associated penalties only deter if three conditions are present.What are these conditions?
Question
The penalty for violating the National Information Infrastructure Protection Act of 1996 depends on the value of the information obtained and whether the offense is judged to have been committed for one of three reasons.What are those reasons?
Question
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?

A) liability
B) restitution
C) due diligence
D) jurisdiction
Question
What is the key difference between law an ethics?
Question
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community?

A) utilitarian
B) virtue
C) fairness or justice
D) common good
Question
The act of attempting to prevent an unwanted action by threatening punishment orretaliation on the instigator if the act takes place is known as ___________.
Question
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question,what do others think is right?

A) Applied ethics
B) Descriptive ethics
C) Normative ethics
D) Deontological ethics
Question
There are three general categories of unethical behavior that organizations and society should seek to eliminate.Which of the following is NOT one of them?

A) ignorance
B) malice
C) accident
D) intent
Question
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)2
B) ACM
C) SANS
D) ISACA
Question
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
Question
The branch of philosophy that considers nature,criteria,sources,logic,and the validity ofmoral judgment is known as ___________.
Question
Describe the Freedom of Information Act.How does its application apply to federal vs.state agencies?
Question
Discuss the three general categories of unethical behavior that organizations should try to control.
Question
Any court can impose its authority over an individual or organization if it can establish which of the following?

A) jurisprudence
B) jurisdiction
C) liability
D) sovereignty
Question
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
Question
Information ____________ occurs when pieces of non-private data are combined to createinformation that violates privacy.
Question
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices.What are three of these principles?
Question
Briefly describe five different types of laws.
Question
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
Question
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws,policies and technical controls.

A) remediation
B) deterrence
C) persecution
D) rehabilitation
Question
A key difference between policy and law is that ignorance of policy is a viable defense.What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
the study of what makes actions right or wrong,also known as moral theory
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
defines socially acceptable behaviors
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
a collection of statutes that regulates the interception of wire,electronic,and oral communications ​
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
an approach that applies moral codes to actions drawn from realistic situations
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
Question
Describe three of the five foundations and frameworks of ethics.
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
addresses violations harmful to society and is actively enforced and prosecuted by the state
Question
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
focuses on enhancing the security of the critical infrastructure in the United States
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Compliance: Law and Ethics
1
Which of the following is an international effort to reduce the impact of copyright,trademark, and privacy infringement,especially via the removal of technological copyright protection measures?

A) U.S. Copyright Law
B) PCI DSS
C) European Council Cybercrime Convention
D) DMCA
D
2
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?

A) ECPA
B) Sarbanes-Oxley
C) HIPAA
D) Gramm-Leach-Bliley
C
3
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications?

A) The Electronic Communications Privacy Act of 1986
B) The Telecommunications Deregulation and Competition Act of 1996
C) National Information Infrastructure Protection Act of 1996
D) Federal Privacy Act of 1974
A
4
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics?

A) Applied ethics
B) Meta-ethics
C) Normative ethics
D) Deontological ethics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
InfraGard began as a cooperative effortbetween the FBI's Cleveland field office and local intelligence ​professionals. ___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?

A) For purposes of commercial advantage
B) For private financial gain
C) For political advantage
D) In furtherance of a criminal act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which law addresses privacy and security concerns associated with the electronic transmission of PHI?

A) USA Patriot Act of 2001
B) American Recovery and Reinvestment Act
C) Health Information Technology for Economic and Clinical Health Act
D) National Information Infrastructure Protection Act of 1996
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Ethics carry the sanction of a governing authority.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Due diligence requires that an organization make a valid and ongoing effort to protect others.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
To protect intellectual property and competitive advantage,Congress passed the EntrepreneurEspionage Act (EEA)in 1996. ___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which law extends protection to intellectual property,which includes words published in electronic formats?

A) Freedom of Information Act
B) U.S. Copyright Law
C) Security and Freedom through Encryption Act
D) Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A signaling lawspecifies a requirement for organizations tonotify affected parties when they have experienced a specified type of loss of information.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
ISACA is a professional association with a focus on authorization,control,andsecurity.___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
It is the responsibility of InfoSec professionals to understand state laws andstandards.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management,use,or operation of each federal computer system?

A) The Telecommunications Deregulation and Competition Act
B) National Information Infrastructure Protection Act
C) Computer Fraud and Abuse Act
D) The Computer Security Act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The Gramm-Leach-Bliley (GLB)Act (alsoknown as the Financial Services Modernization Act of 1999)contains a number of provisionsthat affect banks,securities firms,and insurance companies.___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which subset of civil law regulates the relationships among individuals and among individuals and organizations?

A) tort
B) criminal
C) private
D) public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Deterrence is the best method for preventing an illegal or unethical activity.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Laws and policies and their associated penalties only deter if three conditions are present.What are these conditions?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The penalty for violating the National Information Infrastructure Protection Act of 1996 depends on the value of the information obtained and whether the offense is judged to have been committed for one of three reasons.What are those reasons?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?

A) liability
B) restitution
C) due diligence
D) jurisdiction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What is the key difference between law an ethics?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community?

A) utilitarian
B) virtue
C) fairness or justice
D) common good
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The act of attempting to prevent an unwanted action by threatening punishment orretaliation on the instigator if the act takes place is known as ___________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question,what do others think is right?

A) Applied ethics
B) Descriptive ethics
C) Normative ethics
D) Deontological ethics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
There are three general categories of unethical behavior that organizations and society should seek to eliminate.Which of the following is NOT one of them?

A) ignorance
B) malice
C) accident
D) intent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)2
B) ACM
C) SANS
D) ISACA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The branch of philosophy that considers nature,criteria,sources,logic,and the validity ofmoral judgment is known as ___________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Describe the Freedom of Information Act.How does its application apply to federal vs.state agencies?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Discuss the three general categories of unethical behavior that organizations should try to control.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Any court can impose its authority over an individual or organization if it can establish which of the following?

A) jurisprudence
B) jurisdiction
C) liability
D) sovereignty
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Information ____________ occurs when pieces of non-private data are combined to createinformation that violates privacy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices.What are three of these principles?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly describe five different types of laws.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws,policies and technical controls.

A) remediation
B) deterrence
C) persecution
D) rehabilitation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
A key difference between policy and law is that ignorance of policy is a viable defense.What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
the study of what makes actions right or wrong,also known as moral theory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
defines socially acceptable behaviors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
a collection of statutes that regulates the interception of wire,electronic,and oral communications ​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
an approach that applies moral codes to actions drawn from realistic situations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Describe three of the five foundations and frameworks of ethics.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
addresses violations harmful to society and is actively enforced and prosecuted by the state
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
​a.criminal law
b.public law
c.ethics
d.Computer Security Act (CSA)
e.Electronic Communications Privacy Act
f.Cybersecurity Act
g.normative ethics
h.applied ethics
focuses on enhancing the security of the critical infrastructure in the United States
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.