100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITSY 1300 Fundamentals of Information Security Chapter 3 Review Exam Actual Solution 2022 $8.99   Add to cart

Exam (elaborations)

ITSY 1300 Fundamentals of Information Security Chapter 3 Review Exam Actual Solution 2022

 1 view  0 purchase
  • Course
  • Institution

ITSY 1300 Fundamentals of Information Security Chapter 3 Review Exam Actual Solution 2022

Preview 2 out of 5  pages

  • May 28, 2022
  • 5
  • 2020/2021
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ITSY 1300 Fundamentals of Information
Security Chapter 3 Review Exam
The National Information Infrastructure Protection Act of 1996 modified which Act?
Correct Answers: Computer Fraud and Abuse Act

T/F
Employees are not deterred by the potential loss of certification or professional accreditation resulting
from a breach of a code of conduct as this loss has no effect on employees' marketability and earning
power.
Correct Answers: False

T/F
Studies on ethics and computer use reveal that people of different nationalities have different
perspectives; difficulties arise when one nationality's ethical behavior violates the ethics of another
national group.
Correct Answers: True

What is the subject of the Computer Security Act?
Correct Answers: Federal Agency Information Security

The __________ attempts to prevent trade secrets from being illegally shared.
Correct Answers: Economic Espionage Act

T/F
The Graham-Leach-Bliley Act is a critical piece of legislation that affects the executive management
of publicly traded corporations and public accounting firms.
Correct Answers: False

T/F
The code of ethics put forth by (ISC)2 focuses on four mandatory canons: "Protect society, the
commonwealth, and the infrastructure; act honorably, honestly, justly, responsibly, and legally;
provide diligent and competent service to "principals"; and advance and protect the profession.".
Correct Answers: True

T/F
Laws, policies, and their associated penalties only provide deterrence if, among other things,
potential offenders fear the probability of a "penalty" being applied.
Correct Answers: True

T/F
The "communications networks" of the United States carry more funds than all of the armored cars in
the world combined.
Correct Answers: True

, The Privacy of Customer Information Section of the common carrier regulation states that any
proprietary information shall be used explicitly for providing services, and not for any __________
purposes.
Correct Answers: Marketing

__________ law regulates the structure and administration of government agencies and their
relationships with citizens, employees, and other governments.
Correct Answers: Public

What act is a collection of statutes that regulate the interception of wire, electronic, and oral
communications? Correct Answers: Electronics Communications Privacy Act

The Computer __________ and Abuse Act of 1986 is the cornerstone of many computer-related
federal laws and enforcement efforts.
Correct Answers: Fraud

T/F
Individuals with authorization and privileges to manage information within the organization are most
likely to cause harm or damage by accident. Correct Answers: True

T/F
Cultural differences can make it difficulty to determine what is ethical and is not ethical between
cultures, except when it comes to the use of computers, where ethics are considered universal.
Correct Answers: False

T/F
The Department of Homeland Security is the only U.S. federal agency charged with the protection of
American information resources and the investigation of threats to, or attacks on, the resources.
Correct Answers: False

T/F
The "Economic Espionage Act of 1996" protects American ingenuity, intellectual property, and
competitive advantage.
Correct Answers: True

T/F
The "Digital Millennium Copyright Act" is the American law created in response to Directive 95/46/EC,
adopted in 1995 by the European Union.
Correct Answers: False

T/F
The Council of Europe Convention on Cyber-Crime has not been well received by advocates of
intellectual property rights because it de-emphasizes prosecution for copyright infringement, but has
been well received by supporters of individual rights in the U.S.
Correct Answers: False

In a study on software license infringement, those from United States were significantly "more"
permissive than those from the Netherlands and other countries.
Correct Answers: False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nipsey. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

74534 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$8.99
  • (0)
  Add to cart