Deck 2: Compliance: Law and Ethics

Full screen (f)
exit full mode
Question
To protect intellectual property and competitive advantage,Congress passed the Entrepreneur Espionage Act (EEA)in 1996.​ ___________
Use Space or
up arrow
down arrow
to flip the card.
Question
​Deterrence is the best method for preventing an illegal or unethical activity.____________
Question
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management,use,or operation of each federal computer system? 

A) The Telecommunications Deregulation and Competition Act 
B) National Information Infrastructure Protection Act 
C) Computer Fraud and Abuse Act 
D) The Computer Security Act
Question
Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy. _________________________
Question
Ethics carry the sanction of a governing authority.
Question
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following? 

A) For purposes of commercial advantage 
B) For private financial gain 
C) For political advantage 
D) In furtherance of a criminal act
Question
InfraGard began as a cooperative effort between the FBI's Cleveland field office and local intelligence ​professionals.​ ___________
Question
Which law addresses privacy and security concerns associated with the electronic transmission of PHI? 

A) USA Patriot Act of 2001 
B) American Recovery and Reinvestment Act 
C) Health Information Technology for Economic and Clinical Health Act 
D) National Information Infrastructure Protection Act of 1996
Question
​Due diligence requires that an organization make a valid and ongoing effort to protect others.____________
Question
Which law extends protection to intellectual property,which includes words published in electronic formats? 

A) Freedom of Information Act
B) U.S. Copyright Law 
C) Security and Freedom through Encryption Act
D) Sarbanes-Oxley Act
Question
​It is the responsibility of InfoSec professionals to understand state laws and standards.____________
Question
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics? 

A) Applied ethics
B) Meta-ethics 
C) Normative ethics
D) Deontological ethics
Question
​The Gramm-Leach-Bliley (GLB)Act (also known as the Financial Services Modernization Act of 1999)contains a number of provisions that affect banks,securities firms,and insurance companies.___________
Question
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
Question
Which subset of civil law regulates the relationships among individuals and among individualsand organizations? 

A) tort
B) criminal 
C) private
D) public
Question
Which of the following is an international effort to reduce the impact of copyright,trademark,and privacy infringement,especially via the removal of technological copyright protection measures? 

A) U.S. Copyright Law 
B) PCI DSS 
C) European Council Cybercrime Convention 
D) DMCA
Question
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them? 

A) ECPA 
B) Sarbanes-Oxley 
C) HIPAA 
D) Gramm-Leach-Bliley
Question
ISACA is a professional association with a focus on authorization,control,and security.___________
Question
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications? 

A) The Electronic Communications Privacy Act of 1986 
B) The Telecommunications Deregulation and Competition Act of 1996 
C) National Information Infrastructure Protection Act of 1996 
D) Federal Privacy Act of 1974
Question
​A signaling law specifies a requirement for organizations to notify affected parties when they have experienced a specified type of loss of information.____________
Question
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question,what do others think is right? 

A) Applied ethics
B) Descriptive ethics 
C) Normative ethics
D) Deontological ethics
Question
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
Question
Any court can impose its authority over an individual or organization if it can establish which of the following? 

A) jurisprudence
B) jurisdiction 
C) liability
D) sovereignty
Question
Discuss the three general categories of unethical behavior that organizations should try to control.
Question
There are three general categories of unethical behavior that organizations and society should seek to eliminate.Which of the following is NOT one of them? 

A) ignorance
B) malice 
C) accident
D) intent
Question
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
Question
Information ____________ occurs when pieces of non-private data are combined to create information that violates privacy.​
Question
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
Question
Which of the following is compensation for a wrong committed by an employee acting with or without authorization? 

A) liability
B) restitution 
C) due diligence
D) jurisdiction
Question
The branch of philosophy that considers nature,criteria,sources,logic,and the validity of moral judgment is known as ___________.
Question
Briefly describe five different types of laws.
Question
The penalty for violating the National Information Infrastructure Protection Act of 1996 depends on the value of the information obtained and whether the offense is judged to have been committed for one of three reasons. What are those reasons?
Question
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices. What are three of these principles?
Question
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws,policies and technical controls.

A) remediation
B) deterrence 
C) persecution
D) rehabilitation
Question
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community? 

A) utilitarian
B) virtue 
C) fairness or justice
D) common good
Question
The act of attempting to prevent an unwanted action by threatening punishment or retaliation on the instigator if the act takes place is known as ___________.
Question
Laws and policies and their associated penalties only deter if three conditions are present. What are these conditions?
Question
Describe the Freedom of Information Act. How does its application apply to federal vs.state agencies?
Question
What is the key difference between law an ethics?
Question
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?  The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)²
B) ACM 
C) SANS
D) ISACA
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
a collection of statutes that regulates the interception of wire,electronic,and oral communications​
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
Question
A key difference between policy and law is that ignorance of policy is a viable defense. What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
focuses on enhancing the security of the critical infrastructure in the United States
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
an approach that applies moral codes to actions drawn from realistic situations
Question
Describe three of the five foundations and frameworks of ethics.
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
defines socially acceptable behaviors
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
addresses violations harmful to society and is actively enforced and prosecuted by the state
Question
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
the study of what makes actions right or wrong,also known as moral theory
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Compliance: Law and Ethics
1
To protect intellectual property and competitive advantage,Congress passed the Entrepreneur Espionage Act (EEA)in 1996.​ ___________
 False
Economic
2
​Deterrence is the best method for preventing an illegal or unethical activity.____________
 True
3
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management,use,or operation of each federal computer system? 

A) The Telecommunications Deregulation and Competition Act 
B) National Information Infrastructure Protection Act 
C) Computer Fraud and Abuse Act 
D) The Computer Security Act
D
4
Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy. _________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Ethics carry the sanction of a governing authority.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following? 

A) For purposes of commercial advantage 
B) For private financial gain 
C) For political advantage 
D) In furtherance of a criminal act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
InfraGard began as a cooperative effort between the FBI's Cleveland field office and local intelligence ​professionals.​ ___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which law addresses privacy and security concerns associated with the electronic transmission of PHI? 

A) USA Patriot Act of 2001 
B) American Recovery and Reinvestment Act 
C) Health Information Technology for Economic and Clinical Health Act 
D) National Information Infrastructure Protection Act of 1996
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
​Due diligence requires that an organization make a valid and ongoing effort to protect others.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which law extends protection to intellectual property,which includes words published in electronic formats? 

A) Freedom of Information Act
B) U.S. Copyright Law 
C) Security and Freedom through Encryption Act
D) Sarbanes-Oxley Act
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
​It is the responsibility of InfoSec professionals to understand state laws and standards.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics? 

A) Applied ethics
B) Meta-ethics 
C) Normative ethics
D) Deontological ethics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
​The Gramm-Leach-Bliley (GLB)Act (also known as the Financial Services Modernization Act of 1999)contains a number of provisions that affect banks,securities firms,and insurance companies.___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The Secret Service is charged with the detection and arrest of any person committing a U.S.federal offense relating to computer fraud,as well as false identification crimes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which subset of civil law regulates the relationships among individuals and among individualsand organizations? 

A) tort
B) criminal 
C) private
D) public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is an international effort to reduce the impact of copyright,trademark,and privacy infringement,especially via the removal of technological copyright protection measures? 

A) U.S. Copyright Law 
B) PCI DSS 
C) European Council Cybercrime Convention 
D) DMCA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information,as well as policies and procedures to maintain them? 

A) ECPA 
B) Sarbanes-Oxley 
C) HIPAA 
D) Gramm-Leach-Bliley
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
ISACA is a professional association with a focus on authorization,control,and security.___________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which act is a collection of statutes that regulates the interception of wire,electronic,and oral communications? 

A) The Electronic Communications Privacy Act of 1986 
B) The Telecommunications Deregulation and Competition Act of 1996 
C) National Information Infrastructure Protection Act of 1996 
D) Federal Privacy Act of 1974
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
​A signaling law specifies a requirement for organizations to notify affected parties when they have experienced a specified type of loss of information.____________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question,what do others think is right? 

A) Applied ethics
B) Descriptive ethics 
C) Normative ethics
D) Deontological ethics
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Any court can impose its authority over an individual or organization if it can establish which of the following? 

A) jurisprudence
B) jurisdiction 
C) liability
D) sovereignty
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss the three general categories of unethical behavior that organizations should try to control.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
There are three general categories of unethical behavior that organizations and society should seek to eliminate.Which of the following is NOT one of them? 

A) ignorance
B) malice 
C) accident
D) intent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Ethics are based on ___________________,which are the relatively fixed moral attitudes or customs of a societal group.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Information ____________ occurs when pieces of non-private data are combined to create information that violates privacy.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
___________________ is a subset of civil law that allows individuals to seek redress in the event of personal,physical,or financial injury.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is compensation for a wrong committed by an employee acting with or without authorization? 

A) liability
B) restitution 
C) due diligence
D) jurisdiction
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The branch of philosophy that considers nature,criteria,sources,logic,and the validity of moral judgment is known as ___________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Briefly describe five different types of laws.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The penalty for violating the National Information Infrastructure Protection Act of 1996 depends on the value of the information obtained and whether the offense is judged to have been committed for one of three reasons. What are those reasons?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
The Computer Security Act charges the National Bureau of Standards,in cooperation with the National Security Agency (NSA),with the development of five standards and guidelines establishing minimum acceptable security practices. What are three of these principles?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws,policies and technical controls.

A) remediation
B) deterrence 
C) persecution
D) rehabilitation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community? 

A) utilitarian
B) virtue 
C) fairness or justice
D) common good
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The act of attempting to prevent an unwanted action by threatening punishment or retaliation on the instigator if the act takes place is known as ___________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Laws and policies and their associated penalties only deter if three conditions are present. What are these conditions?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Describe the Freedom of Information Act. How does its application apply to federal vs.state agencies?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What is the key difference between law an ethics?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications?  The code includes the canon: Provide diligent and competent service to principals.

A) (ISC)²
B) ACM 
C) SANS
D) ISACA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
regulates the structure and administration of government agencies and their relationships with citizens,employees,and other governments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
a collection of statutes that regulates the interception of wire,electronic,and oral communications​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
A key difference between policy and law is that ignorance of policy is a viable defense. What steps must be taken to assure that an organization has a reasonable expectation that policy violations can be appropriately penalized without fear of legal retribution?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
focuses on enhancing the security of the critical infrastructure in the United States
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
an approach that applies moral codes to actions drawn from realistic situations
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe three of the five foundations and frameworks of ethics.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
defines socially acceptable behaviors
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
addresses violations harmful to society and is actively enforced and prosecuted by the state
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
​a. criminal law
b. public law
c. ethics
d. Computer Security Act (CSA)
e. Electronic Communications Privacy Act
f. Cybersecurity Actg. normative ethicsh. applied ethics
the study of what makes actions right or wrong,also known as moral theory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.