100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
WGU COURSE C841 - LEGAL ISSUES IN INFORMATION SECURITY VERIFIED STUDY GUIDE WITH COMPREHENSIVE QUESTIONS AND CORRECT ANSWERS LATEST UPDATE 2024$11.99
Add to cart
WGU COURSE C841 - LEGAL ISSUES IN INFORMATION
SECURITY VERIFIED STUDY GUIDE WITH
COMPREHENSIVE QUESTIONS AND CORRECT ANSWERS
LATEST UPDATE 2024
The main goal of information security is to protect:
A confidentiality, integrity, and availability
B non-public personally identifiable information
C financial data of public entities
D personal health data and biometrics - (correct answer) A
The _____________________ established the national banking system in the United
States.
A Bank Holding Company Act of 1956
B Bank Secrecy Act of 1970
C Gramm-Leach-Bliley Act
D National Bank Act of 1864 - (correct answer) D
What does ISO stand for?
A International Organization for Security
B Independent Standards Organization
C International Security Organization
D International Organization for Standardization - (correct answer) D
When testing a disaster recovery plan, which test involves hypothetical role-playing of a
disaster?
A full interruption
B parallel
C scenario
D walk-through - (correct answer) C
____________ is the practice of tracking a user's actions on the Internet in order to
create a user profile.
A Clickstreaming
B Targeted advertising
C Radio Frequency Identification (RFID)
D Online profiling - (correct answer) D
What are the four privacy torts that still exist today?
,A ECPA, Privacy Act, E-Government Act, and Patriot Act
B intrusion into seclusion, portrayal in a false light, appropriation of likeness or identity,
and public disclosure of private facts
C right to privacy, reasonable person standard, fair information practice principles, and
the Wiretap Act
D in the U.S. Constitution, the First Amendment, Third Amendment, Fourth Amendment,
and Fifth Amendment - (correct answer) B
The ________________________ protects the personal information of children online.
A Children's Internet Protection Act (CIPA)
B Family Educational Rights and Privacy Act (FERPA)
C Health Insurance Portability and Accountability Act (HIPAA)
D Children's Online Privacy Protection Act (COPPA) - (correct answer) D
Congress can create laws in areas where the________________ allows it.
A U.S. Constitution
B President
C U.S. Supreme Court
D House of Representatives - (correct answer) A
Compensatory, consequential, nominal, and liquidated are all types of ____________.
A performance
B remedies
C damages
D breach - (correct answer) C
The _________________ creates international guiding principles for computer forensic
examiners.
A International Organization on Computer Evidence (IOCE)
B American Bar Association Forensic Division
C International Association of Computer Investigative Specialists (IACIS)
D U.S. Federal Bureau of Investigations (FBI) - (correct answer) A
All of the following are eligibility requirements for the president of the United States
except:
A None of these
B must be a resident of the United States for at least 14 years at the time of election
C must be at least 35 years old - (correct answer) A
Massachusetts' "Standards for the Protection of Personal Information of Residents of
the Commonwealth" was released in September 2008 and is known for being "unique"
,in terms of its data protection standard. Which of the following statements best captures
that uniqueness?
A It attempts to regulate businesses outside of Massachusetts by requiring businesses
to encrypt the personal data of Massachusetts residents.
B The standard states that an information security program must include specific
security requirements.
C Under the data protection standard, personal information is a person's first and last
name, or first initial and last name, and any of the following: Social Security number,
driver's license number, or state identification card number.
D It states that an entity's information security program must be a good fit for its size
and scope. It also must fit the entity's type of business. - (correct answer) A
In 1998, Congress passed the _________________________.This law helps protect
copyrights in the multimedia world. It also contains provisions that help insulate Internet
service providers from the actions of their customers.
A Online Copyright Infringement Liability Limitation Act
B Computer Maintenance Competition Assurance Act
C Vessel Hull Design Protection Act
D Digital Millennium Copyright Act - (correct answer) D
How does the U.S. Constitution refer to itself?
A The just Laws of the United States
B The first Law of the States
C The Federal Government blueprint
D The supreme Law of the Land - (correct answer) D
_______________________ attempts to use real numbers to calculate risk and
potential loss.
A Qualitative risk analysis
B Quantitative risk analysis
C A disaster recovery plan
D An incident response analysis - (correct answer) B
SOX ___________ imposes criminal liability for fraudulent financial certifications.
A Section 302
B Section 708
C Section 906
D Section 404 - (correct answer) C
, A(n) _____________ is a formal request for a higher authority to review the decision of
a lower court.
A holding
B appeal
C writ of certiorari
D pleading - (correct answer) B
The Federal Reserve reports directly to:
A the U.S. Congress
B the U.S. Supreme Court
C the Senate
D the president - (correct answer) A
One of the main goals of _______________ is to protect an organization's bottom line.
A tactical planning
B IT management
C an incident response plan
D risk management - (correct answer) D
The Family Policy Compliance Office (FPCO) provides oversight for the
____________________.
A Children's Online Privacy Protection Act (COPPA)
B Family Educational Rights and Privacy Act (FERPA)
C Health Insurance Portability and Accountability Act (HIPAA)
D Children's Internet Protection Act (CIPA) - (correct answer) B
In which of the following places would a person have "a reasonable expectation of
privacy"?
A on the street
B in the workplace
C in a public restroom
D in one's home - (correct answer) D
Which of the following are types of export control regulations?
1 Export Administration Regulations (EAR)
2 None of these
3 International Traffic in Arms Regulations (ITAR)
A 1,3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MEGAMINDS. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.