Filters
Question type

Software license infringement is also often called software __________.

Correct Answer

verifed

verified

__________ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.


A) Public
B) Private
C) Civil
D) Criminal

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The __________ defines stiffer penalties for prosecution of terrorist crimes.


A) USA PATRIOT Act
B) Sarbanes-Oxley Act
C) Gramm-Leach-Bliley Act
D) Economic Espionage Act

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The __________ Act of 2001 provides law enforcement agencies with broader latitude in order to combat terrorism-related activities.

Correct Answer

verifed

verified

U.S.A. PAT...

View Answer

Laws, policies, and their associated penalties only deter if which of the following conditions is present?


A) Fear of penalty
B) Probability of being caught
C) Probability of penalty being administered
D) All of the above

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

__________ is the unauthorized taking of personally identifiable information with the intent of committing fraud or another illegal or unethical purpose.

Correct Answer

verifed

verified

Identity t...

View Answer

Unethical and illegal behavior is generally caused by ignorance (of policy and/or the law), by accident, and by inadequate protection mechanisms.

A) True
B) False

Correct Answer

verifed

verified

The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research.

A) True
B) False

Correct Answer

verifed

verified

Family law, commercial law, and labor law are all encompassed by __________ law.

Correct Answer

verifed

verified

The NSA is responsible for signal intelligence, information assurance products and services, and enabling computer network operations to gain a decision advantage for the United States and its allies under all circumstances.

A) True
B) False

Correct Answer

verifed

verified

The __________ is a nonprofit organization that focuses on the development and implementation of information security certifications and credentials.

Correct Answer

verifed

verified

International Information Systems Securi...

View Answer

The __________ is a respected professional society that was established in 1947 as "the world's first educational and scientific computing society."

Correct Answer

verifed

verified

Associatio...

View Answer

The __________ Act seeks to improve the reliability and accuracy of financial reporting, as well as increase the accountability of corporate governance, in publicly traded companies.

Correct Answer

verifed

verified

Sarbanes-Oxley
Corpo...

View Answer

__________ is the legal obligation of an entity that extends beyond criminal or contract law.

Correct Answer

verifed

verified

The communications networks of the United States carry(ies) more funds than all of the armored cars in the world combined. _________________________

A) True
B) False

Correct Answer

verifed

verified

The National Information Infrastructure Protection Act of 1996 modified which act?


A) USA PATRIOT Act
B) USA PATRIOT Improvement and Reauthorization Act
C) Computer Security Act
D) Computer Fraud and Abuse Act

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Laws, policies, and their associated penalties only provide deterrence if three conditions are present. List and describe them.

Correct Answer

verifed

verified

Fear of penalty: Potential offenders mus...

View Answer

Intellectual privacy is recognized as a protected asset in the United States. _________________________

A) True
B) False

Correct Answer

verifed

verified

The __________ Act of 1966 allows any person to request access to federal agency records or information not determined to be a matter of national security.

Correct Answer

verifed

verified

Freedom of...

View Answer

The __________ attempts to prevent trade secrets from being illegally shared.


A) Electronic Communications Privacy Act
B) Sarbanes-Oxley Act
C) Financial Services Modernization Act
D) Economic Espionage Act

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 84

Related Exams

Show Answer