Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice Study Set 1
Quiz 19: Legal and Ethical Aspects
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
No cybercriminal databases exist that can point investigators to likely suspects.
Question 2
True/False
Concerns about the extent to which personal privacy has been and may be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
Question 3
True/False
An example of a patent from the computer security realm is the RSA public-key cryptosystem.
Question 4
True/False
Computer technology has involved the creation of new types of entities for which no agreed ethical rules have previously been formed.
Question 5
True/False
The successful use of law enforcement depends much more on technical skills than on people skills.
Question 6
True/False
A servicemark is the same as a trademark except that it identifies and distinguishes the source of a service rather than a product.
Question 7
True/False
The legal and ethical aspects of computer security encompass a broad range of topics.
Question 8
True/False
Software is an example of real property.
Question 9
True/False
The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users.
Question 10
Multiple Choice
The success of cybercriminals,and the relative lack of success of law enforcement,influence the behavior of _______.
Question 11
True/False
The first comprehensive privacy legislation adopted in the United States was the Privacy Act of 1974.
Question 12
True/False
Anyone can join the Ad Hoc Committee on Responsible Computing.
Question 13
True/False
The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers,boldness,and the global scale of their operations.
Question 14
True/False
Computers as targets is a form of crime that involves an attack on data integrity,system integrity,data confidentiality,privacy,or availability.
Question 15
True/False
Computer attacks are considered crimes but do not carry criminal sanctions.
Question 16
Multiple Choice
Personal effects,moveable property and goods,such as cars,bank accounts,wages,securities,a small business,furniture,insurance policies,jewelry,patents,and pets are all examples of _________.
Question 17
Multiple Choice
_______ is a form of crime that targets a computer system to acquire information stored on that computer system,to control the target system without authorization or payment,or to alter the integrity of data or interfere with the availability of the computer or server.
Question 18
Multiple Choice
Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.
Question 19
True/False
The Common Criteria specification is primarily concerned with the privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.