100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS 2200 FINAL EXAM QUESTIONS & ANSWERS LATEST UPDATE 2025

Rating
-
Sold
1
Pages
7
Grade
A+
Uploaded on
25-04-2025
Written in
2024/2025

The _____ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records - ANSWER Privacy Act of 1974 Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital society. - ANSWER property rights and obligations

Show more Read less
Institution
CIS 2200
Course
CIS 2200









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIS 2200
Course
CIS 2200

Document information

Uploaded on
April 25, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cis 2200

Content preview

CIS 2200 FINAL EXAM QUESTIONS &
ANSWERS LATEST UPDATE 2025
The _____ is the most important U.S. federal statute regarding conditions for handling
information regarding credit reporting and financial records - ANSWER Privacy Act of
1974

Regarding moral dimensions of the information age, ________ include(s) the issue
addressing intellectual property rights in a digital society. - ANSWER property rights and
obligations

_______ scans data and can help identify a man at a ticket counter who shares a phone
number with a known terrorist - ANSWER NORA

Regarding moral dimensions of the information age, ________ include(s) the issue of
who can and will be held liable for harm done to property rights. - ANSWER
accountability and control

The act that aims at protecting medical records is the - ANSWER HIPAA

The Internet has made intellectual property - ANSWER difficult to protect

________ refers to the principles of right and wrong that individuals use to make
choices. - ANSWER ethics

The Children's Online Privacy Protection Act (COPPA) focuses on ________. -
ANSWER parental permissions

________ businesses gather and sell personal information to government agencies. -
ANSWER data broker businesses

Copyright protects creators (corporate-owned) of intellectual property for ________. -
ANSWER 95 years after initial creation

Advances in data storage techniques and the rapidly declining costs of data storage
threaten _____ - ANSWER individual privacy

Regarding moral dimensions of the information age, ________ is the standard by which
cultural values are evaluated and supported in a digital society. - ANSWER quality of life

________ are small text files loaded on a computer when a user visits Web sites. -
ANSWER Cookies

, Regarding moral dimensions of the information age, ________ include(s) the issue of
determining the data that individuals and organizations can protect. - ANSWER
information rights and obligations


The "patent trial of the century" in 2011 was between ___________ and ___________
for violating patents for iPhones - ANSWER Apple; Samsung

Which of the following is NOT part of the analysis of a situation that presents an ethical
issue? - ANSWER Avoid actions with extremely low failure costs

Formalizing standards, rules and procedures to ensure that the organization's general
and application security controls are properly executed and enforced is a(n)
___________ control - ANSWER administrative

Public key encryption uses ______ key(s) - ANSWER two

The most commonly used authentication technique used for end users is
____________ - ANSWER password

Viruses differ from worms because worms - ANSWER can operate on their own without
attaching to other computer program files

___________ is a method for encrypting network traffic on the web - ANSWER SSL

An information systems __________ examines a firm's overall security environment and
determines if the organization is properly prepared to address threats - ANSWER audit

If someone sends you an email trying to appear as a normal site that you commonly
visit to obtain unauthorized information, the person is __________ - ANSWER phishing

A ____________ is a program that monitors information traveling over a network and
_______ - ANSWER sniffer; is never legitimately used

IS security firewalls are an example of a _________ - ANSWER gatekeeper

__________ is used to ensure the person is who he/she claims to be - ANSWER
Authentication

In 2002, the ________ Act was passed to help protect investors with new financial
statements reforms - ANSWER Sarbanese-Oxley

Someone who intends to gain unauthorized access to a computer system is considered
to be a __________ - ANSWER hacker

SQL injection attacks are related to _____________ - ANSWER databases

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
shantelleG West Virgina University
View profile
Follow You need to be logged in order to follow users or courses
Sold
609
Member since
2 year
Number of followers
368
Documents
17845
Last sold
4 days ago
GOLD PREMIUM

HELLO? welcome to my store thanks for visiting this page here you are guaranteed of well revised and assured EXAMS ALL GRADED A+ thus making your education journey easy and seamless . DO NOT HESITATE TO CONTACT ME IF YOU ARE IN NEED OF ANY EXAM .I AM READY 24/7 TO ASSIST YOU ALSO REFER YOUR FRIENDS.

4.1

115 reviews

5
69
4
10
3
22
2
2
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions