Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Criminal Justice
Study Set
Cyberspace Cybersecurity and Cybercrime
Quiz 10: Cyber Security Policies and Legal Issues
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Which of the following critical infrastructures was NOT a focus of the Network and Information Security Directive?
Question 2
Multiple Choice
______ has become one of the most feared threats to cybersecurity.
Question 3
Multiple Choice
The ______ creates a cybersecurity information sharing system for public and private entities.
Question 4
Multiple Choice
Assessing critical assets that need to be protected, such as trade secrets to determine what receives the highest priority, is a component of ______.
Question 5
Multiple Choice
The ______ proved to be symbolic legislation that assures the public that the international community is taking steps to combat cybercrime and the threat of a cyberwar.
Question 6
Multiple Choice
The ______ provided the basis for a comprehensive cyber security strategy.
Question 7
Multiple Choice
A holistic approach to cybersecurity involves cooperation between all of the following except ______.
Question 8
Multiple Choice
The ______ requires the secretary of homeland security to assess the work of the cybersecurity workforce of the Department of Homeland Security and develop a comprehensive strategy to improve the readiness and quality of the cybersecurity workforce.
Question 9
Multiple Choice
In 2016, the European Union passed the ______ establishing the first actual cybersecurity rules.
Question 10
Multiple Choice
The ______ gives government the authority to collect content records related to telephonic activities.
Question 11
Multiple Choice
Examples of proprietary information include all of the following except ______.
Question 12
Multiple Choice
The ______ has the responsibility to coordinate federal, state, and local governments, laboratories, critical infrastructure owners and operators, and other entities to accomplish goals pertinent to the National Cybersecurity and Critical Infrastructure Protection Act of 2014.
Question 13
Multiple Choice
Jeopardizing the security, integrity, confidentiality, or availability of an information system or network or any information stored on, processed on, or transiting such a system is also referred to as a ______.