Exam 2: Compliance: Law and Ethics
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Deterrence is the best method for preventing an illegal or unethical activity.
Free
(True/False)
4.9/5
(38)
Correct Answer:
True
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
Free
(Multiple Choice)
4.7/5
(27)
Correct Answer:
B
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?
(Multiple Choice)
4.8/5
(33)
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
(Short Answer)
4.9/5
(35)
It is the responsibility of InfoSec professionals to understand state laws and standards.
(True/False)
4.7/5
(37)
Any court can impose its authority over an individual or organization if it can establish which of the following?
(Multiple Choice)
4.9/5
(40)
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
(Multiple Choice)
4.8/5
(43)
Describe the Freedom of Information Act. How does its application apply to federal vs.state agencies?
(Essay)
4.8/5
(34)
The Gramm-Leach-Bliley (GLB)Act (also known as the Financial Services Modernization Act of 1999)contains a number of provisions that affect banks,securities firms,and insurance companies.
(True/False)
4.8/5
(30)
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications?
(Multiple Choice)
5.0/5
(34)
a collection of statutes that regulates the interception of wire,electronic,and oral communications
(Multiple Choice)
4.8/5
(29)
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices. What are three of these principles?
(Essay)
4.9/5
(34)
Which law extends protection to intellectual property,which includes words published in electronic formats?
(Multiple Choice)
4.8/5
(35)
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
(Short Answer)
4.9/5
(41)
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
(Short Answer)
4.8/5
(22)
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them?
(Multiple Choice)
4.8/5
(34)
A key difference between policy and law is that ignorance of policy is a viable defense. What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
(Essay)
4.9/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)