Deck 12: Regulating and Managing Information Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/52
Play
Full screen (f)
Deck 12: Regulating and Managing Information Technology
1
Creating and distributing viruses on other computers is called hacking.
False
2
In 2013,North Korea opened Internet access to which group of people?
A) All of its natural citizens.
B) South Korean residents.
C) Foreigners using mobile devices and laptops.
D) Investors of Koryolink, a state-owned telecommunications company.
A) All of its natural citizens.
B) South Korean residents.
C) Foreigners using mobile devices and laptops.
D) Investors of Koryolink, a state-owned telecommunications company.
C
3
The primary reason that hackers hack is to make money.
True
4
Researchers for McKinsey & Company along with the World Economic Forum found that many firms struggled to manage the issues of cybercrime.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
5
The Center for Strategic and International Studies recently reported that the global costs of cybercrime run as high as $1 million.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
6
One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
7
Electronic medical records are guaranteed to be 100 percent accurate.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
8
In 2014,the country with the highest percentage of unlicensed software users was Venezuela.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
9
Bill Joy,Sun Microsystems' chief scientist,warned that the rapid advances of technology:
A) Solve every insurmountable problem in no time flat.
B) Move too fast, and can take on a life of its own.
C) Are the safest and most human friendly known to civilization.
D) Must be controlled by the companies that invest in them to protect society.
A) Solve every insurmountable problem in no time flat.
B) Move too fast, and can take on a life of its own.
C) Are the safest and most human friendly known to civilization.
D) Must be controlled by the companies that invest in them to protect society.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
10
In 2014,a Ponemon Institute study reported that businesses took an average of 60 days to recover from a cyberattack.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
11
Governments and businesses understand each other's needs and cooperate fully to manage the benefits and threats of newly introduced technology.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
12
The U.S.PRISM program was designed primarily to protect public privacy.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
13
How has the increase in information technology affected criminal activities globally?
A) Crime has remained about the same.
B) Crime has decreased due to better monitoring efforts.
C) The need for government cooperation has been reduced.
D) New mechanisms for stealing data, trafficking contraband and laundering money have emerged.
A) Crime has remained about the same.
B) Crime has decreased due to better monitoring efforts.
C) The need for government cooperation has been reduced.
D) New mechanisms for stealing data, trafficking contraband and laundering money have emerged.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
14
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
15
Which country recently required all video-streaming sites to be approved by the government or risk having their content banned?
A) Iran.
B) Pakistan.
C) North Korea.
D) China.
A) Iran.
B) Pakistan.
C) North Korea.
D) China.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
16
The U.S.government strictly controls the use of GPS and similar tracking devices at the federal level.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
17
Many authoritarian governments have expanded Internet censorship in recent years.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
18
The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
19
The primary reason that governments try to keep pace with technology is to:
A) Control the speed of innovation.
B) Manage the cost of technology.
C) Ensure that the public is protected.
D) Avoid threats to individuals.
A) Control the speed of innovation.
B) Manage the cost of technology.
C) Ensure that the public is protected.
D) Avoid threats to individuals.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
20
In 2014,NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
21
MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:
A) Uniquely identify an individual's shopping habits and preferences.
B)
B) Collect individual social security numbers.
C) Identify an individual shopper using only four bits of secondary information.
D) Both A and C, but not
A) Uniquely identify an individual's shopping habits and preferences.
B)
B) Collect individual social security numbers.
C) Identify an individual shopper using only four bits of secondary information.
D) Both A and C, but not
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
22
Intellectual property refers to:
A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
23
Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?
A) Support from executive leadership.
B) Involvement by all functional departments.
C) Focus on how to respond to a breach.
D) All of the above.
A) Support from executive leadership.
B) Involvement by all functional departments.
C) Focus on how to respond to a breach.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
24
The purpose of the right to be forgotten is to:
A) Increase protection of privacy and personal information.
B) Protect property rights.
C) Protect intellectual property.
D) Prevent software privacy.
A) Increase protection of privacy and personal information.
B) Protect property rights.
C) Protect intellectual property.
D) Prevent software privacy.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
25
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:
A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
26
Hackers who intend to profit from their actions are motived by:
A) The need for media attention.
B) A desire to retaliate against the government.
C) The thrill of it.
D) Financial incentives.
A) The need for media attention.
B) A desire to retaliate against the government.
C) The thrill of it.
D) Financial incentives.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
27
Which of these statements is (are)true about the group known as Anonymous?
A)
A) They are a tightly bonded group of hacktivists.
B) They are distinguished by masks with an over-sized smile and red cheeks.
C) They supported WikiLeaks and the Occupy movement.
D) Both B and C, but not
A)
A) They are a tightly bonded group of hacktivists.
B) They are distinguished by masks with an over-sized smile and red cheeks.
C) They supported WikiLeaks and the Occupy movement.
D) Both B and C, but not
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
28
Downloading illegal files,spreading computer viruses,and stealing from online bank accounts is collectively referred to as:
A) Hacking.
B) Software piracy.
C) Cybercrime.
D) Internet censorship.
A) Hacking.
B) Software piracy.
C) Cybercrime.
D) Internet censorship.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
29
Most U.S.state laws permit the monitoring of employees through:
A) Tracking software.
B) Eavesdropping on phone calls.
C) Recording computer keystrokes.
D) All of the above.
A) Tracking software.
B) Eavesdropping on phone calls.
C) Recording computer keystrokes.
D) All of the above.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is true about the U.S.government's PRISM program?
A) Technology companies could voluntarily turn over individual private communications.
B) The clandestine program was hidden by Edward Snowden.
C) Critics of the program called it an unwarranted intrusion by Big Brother.
D) Google challenged the program rules and won.
A) Technology companies could voluntarily turn over individual private communications.
B) The clandestine program was hidden by Edward Snowden.
C) Critics of the program called it an unwarranted intrusion by Big Brother.
D) Google challenged the program rules and won.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
31
Which of these actions have Western nations taken to fight cybercrime?
A) Protected only the individual's intellectual property.
B) Guaranteed only personal information privacy.
C) Accessed public information strictly for the private good.
D) Some nations protected personal privacy and others accessed private information for the public good.
A) Protected only the individual's intellectual property.
B) Guaranteed only personal information privacy.
C) Accessed public information strictly for the private good.
D) Some nations protected personal privacy and others accessed private information for the public good.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
32
Software piracy is a major problem in which part of the world?
A) Globally.
B) North America only.
C) Asia only.
D) North America and Asia.
A) Globally.
B) North America only.
C) Asia only.
D) North America and Asia.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
33
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:
A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
34
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:
A) Software pirates.
B) Comodohackers.
C) Hacktivists.
D) Data trafficking groups.
A) Software pirates.
B) Comodohackers.
C) Hacktivists.
D) Data trafficking groups.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
35
Supporters of digitized medical records claim that:
A)
A) The number of common medical errors has remained constant.
B) Computerized prescription-ordering systems avoided over seven million mistakes.
C) Electronic alerts prevented dangerous drug combinations from being prescribed.
D) Both B and C, but not
A)
A) The number of common medical errors has remained constant.
B) Computerized prescription-ordering systems avoided over seven million mistakes.
C) Electronic alerts prevented dangerous drug combinations from being prescribed.
D) Both B and C, but not
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
36
Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:
A) Grey hatters.
B) Black hatters.
C) White hatters.
D) Mad hatters.
A) Grey hatters.
B) Black hatters.
C) White hatters.
D) Mad hatters.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
37
Which website received a favorable review because they limited the ability of hackers to take advantage of one another?
A) Hackers for Hire.
B) Hacker's List.
C) Facebook.
D) ISIS.
A) Hackers for Hire.
B) Hacker's List.
C) Facebook.
D) ISIS.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
38
Which of these statements accurately describe hacktivists known as grey hatters?
A) They always work in tight-knit groups.
B) They are highly welcomed by businesses.
C) They seek retaliation on businesses.
D) They seek media attention and profits.
A) They always work in tight-knit groups.
B) They are highly welcomed by businesses.
C) They seek retaliation on businesses.
D) They seek media attention and profits.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
39
Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to?
A) Suppress political dissent.
B) Impose religious or ideological views.
C)
C) Increase bandwidth for government usage.
D) A and B, but not
A) Suppress political dissent.
B) Impose religious or ideological views.
C)
C) Increase bandwidth for government usage.
D) A and B, but not
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
40
A CIO is the company's:
A) Chief intelligence officer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
A) Chief intelligence officer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss the motivations of cyber criminals.Explain the costs that cybercrime have on businesses,governments and individuals.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
42
Over time the role of the CIO:
A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss the global impact of cybercrime and explain how some international and national groups are fighting it.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
44
This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:
A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks (IDAWA).
D) Data Privacy Day.
A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks (IDAWA).
D) Data Privacy Day.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
45
Explain the concept of the "right to be forgotten." What are its implications to governments,businesses and individuals?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
46
Why is the management and regulation of information technology a challenge for governments and businesses? What are some advantages of the two entities working together?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss some of the interventions that different governments have taken to control information technology in their nations.How have these steps affected individual privacy rights as well as public security?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
48
Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"?
A) Russia.
B) Iran.
C) Iraq.
D) Mexico.
A) Russia.
B) Iran.
C) Iraq.
D) Mexico.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
49
What have businesses done to manage personal information about their employees and customers? Identify a specific company that has taken action and discuss the results.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is not a role of the CIO?
A) Acting as lead security officer.
B) Educating the organization about technology initiatives.
C) Marketing technology projects to stakeholders.
D) Monitoring the appropriate level of employee headcount.
A) Acting as lead security officer.
B) Educating the organization about technology initiatives.
C) Marketing technology projects to stakeholders.
D) Monitoring the appropriate level of employee headcount.
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
51
How is the corporate Chief Information Officer (CIO)a "security guard" for the organization? What are some of the important responsibilities of the CIO?
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck
52
Which of these steps has the U.S.recently taken to counter cybercrime?
A) Setup a system of voluntary cybersecurity standards.
B) Opened a new center dedicated to managing cyber activities.
C)
C) Passed sweeping new legislation that required Internet providers to guarantee security.
D) Both A and B, but not
A) Setup a system of voluntary cybersecurity standards.
B) Opened a new center dedicated to managing cyber activities.
C)
C) Passed sweeping new legislation that required Internet providers to guarantee security.
D) Both A and B, but not
Unlock Deck
Unlock for access to all 52 flashcards in this deck.
Unlock Deck
k this deck