Exam 19: Legal and Ethical Aspects
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A _______ for an invention is the grant of a property right to the inventor.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
A
The first comprehensive privacy legislation adopted in the United
States was the Privacy Act of 1974.
Free
(True/False)
4.8/5
(33)
Correct Answer:
True
The copyright owner has which exclusive right(s)?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
The three types of patents are: utility patents,design patents,and ________.
(Essay)
4.8/5
(37)
Land and things permanently attached to the land,such as trees,buildings,and stationary mobile homes are _______.
(Multiple Choice)
4.8/5
(38)
An example of a patent from the computer security realm is the RSA
public-key cryptosystem.
(True/False)
4.9/5
(31)
The successful use of law enforcement depends much more on
technical skills than on people skills.
(True/False)
4.9/5
(37)
The U.S.legal system distinguishes three primary types of property: real property,personal property,and _________ property.
(Essay)
4.8/5
(35)
No cybercriminal databases exist that can point investigators to
likely suspects.
(True/False)
4.9/5
(37)
A servicemark is the same as a trademark except that it identifies and
distinguishes the source of a service rather than a product.
(True/False)
4.9/5
(35)
The right to seek civil recourse against anyone infringing his or her property is granted to the ________.
(Essay)
4.8/5
(31)
The purpose of the privacy functions is to provide a user protection
against discovery and misuse of identity by other users.
(True/False)
4.9/5
(33)
The invasion of the rights secured by patents,copyrights,and trademarks is ________.
(Essay)
4.7/5
(32)
________ is a method for minimizing exposure of individual information while enabling continuous analysis of potentially interconnected data.
(Multiple Choice)
4.9/5
(33)
The relative lack of success in bringing cybercriminals to justice has
led to an increase in their numbers,boldness,and the global scale of their operations.
(True/False)
4.9/5
(33)
The Common Criteria specification is primarily concerned with the
privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual's use of computer resources.
(True/False)
4.9/5
(38)
_____ strengthens the protection of copyrighted materials in digital format.
(Multiple Choice)
4.9/5
(33)
A ______ handles the financial transaction for issuing the digital license to the consumer and pays royalty fees to the content provider and distribution fees to the distributor accordingly.
(Essay)
4.8/5
(28)
_______ refers to a system of moral principles that relates to the benefits and harms of particular actions,and to the rightness and wrongness of motives and ends of those actions.
(Essay)
4.8/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)