Exam 19: Legal and Ethical Aspects
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
_______ or cybercrime,is a term used broadly to describe criminal activity in which computers or computer networks are a tool,a target,or a place of criminal activity.
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
Computer crime
Personal effects,moveable property and goods,such as cars,bank accounts,wages,securities,a small business,furniture,insurance policies,jewelry,patents,and pets are all examples of _________.
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
C
The three types of patents are: utility patents,design patents,and ________.
Free
(Short Answer)
4.7/5
(29)
Correct Answer:
plant patents
The success of cybercriminals,and the relative lack of success of law enforcement,influence the behavior of _______.
(Multiple Choice)
4.8/5
(34)
The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.
(True/False)
4.9/5
(37)
_____ strengthens the protection of copyrighted materials in digital format.
(Multiple Choice)
4.9/5
(42)
________ is a function that removes specific identifying information from query results,such as last name and telephone number,but creates some sort of unique identifier so that analysts can detect connections between queries.
(Multiple Choice)
4.8/5
(35)
The successful use of law enforcement depends much more on
technical skills than on people skills.
(True/False)
4.8/5
(35)
Computers as targets is a form of crime that involves an attack on data
integrity,system integrity,data confidentiality,privacy,or availability.
(True/False)
4.7/5
(30)
________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.
(Multiple Choice)
4.8/5
(30)
The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users.
(True/False)
4.9/5
(28)
Concerns about the extent to which personal privacy has been and
may be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
(True/False)
4.7/5
(33)
Both policy and ________ approaches are needed to protect privacy when both government and nongovernment organization seek to learn as much as possible about individuals.
(Short Answer)
4.8/5
(32)
________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.
(Multiple Choice)
4.9/5
(47)
A ______ is a word,name,symbol,or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others.
(Multiple Choice)
4.9/5
(40)
Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.
(Multiple Choice)
4.9/5
(37)
The legal and ethical aspects of computer security encompass a broad
range of topics.
(True/False)
4.9/5
(37)
Any intangible asset that consists of human knowledge and ideas is _______.
(Multiple Choice)
4.8/5
(36)
An example of a patent from the computer security realm is the RSA
public-key cryptosystem.
(True/False)
4.8/5
(40)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)