Exam 19: Legal and Ethical Aspects
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The first comprehensive privacy legislation adopted in the UnitedStates was the Privacy Act of 1974.
Free
(True/False)
4.9/5
(37)
Correct Answer:
True
Any intangible asset that consists of human knowledge and ideas is _______.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
C
Computers as targets is a form of crime that involves an attack on dataintegrity, system integrity, data confidentiality, privacy, or availability.
Free
(True/False)
4.8/5
(28)
Correct Answer:
True
The relative lack of success in bringing cybercriminals to justice hasled to an increase in their numbers, boldness, and the global scale of their operations.
(True/False)
4.9/5
(32)
A servicemark is the same as a trademark except that it identifies anddistinguishes the source of a service rather than a product.
(True/False)
4.9/5
(34)
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.
(Multiple Choice)
4.8/5
(36)
The successful use of law enforcement depends much more ontechnical skills than on people skills.
(True/False)
4.8/5
(34)
Land and things permanently attached to the land, such as trees, buildings, and stationary mobile homes are _______.
(Multiple Choice)
4.9/5
(28)
________ is a function that removes specific identifying information from query results, such as last name and telephone number, but creates some sort of unique identifier so that analysts can detect connections between queries.
(Multiple Choice)
4.9/5
(31)
Computer attacks are considered crimes but do not carry criminalsanctions.
(True/False)
4.8/5
(29)
The invasion of the rights secured by patents, copyrights, and trademarks is ________.
(Short Answer)
4.8/5
(30)
The ___________ Act places restrictions on online organizations in the collection of data from children under the age of 13.
(Short Answer)
4.8/5
(41)
________ ensures that a user may make multiple uses of resources or services without others being able to link these uses together.
(Multiple Choice)
4.8/5
(25)
No cybercriminal databases exist that can point investigators tolikely suspects.
(True/False)
5.0/5
(36)
Computer technology has involved the creation of new types ofentities for which no agreed ethical rules have previously been formed.
(True/False)
4.8/5
(37)
Concerns about the extent to which personal privacy has been andmay be compromised have led to a variety of legal and technical approaches to reinforcing privacy rights.
(True/False)
4.7/5
(38)
_____ strengthens the protection of copyrighted materials in digital format.
(Multiple Choice)
4.7/5
(38)
A(n) _________ may be granted to anyone who invents or discovers any new and useful process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof.
(Short Answer)
4.7/5
(37)
A ________ provides distribution channels, such as an online shop or a Web retailer.
(Multiple Choice)
4.9/5
(46)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)