ANSWERS LATEST UPDATE 2025
The _____ is the most important U.S. federal statute regarding conditions for handling
information regarding credit reporting and financial records - ANSWER Privacy Act of
1974
Regarding moral dimensions of the information age, ________ include(s) the issue
addressing intellectual property rights in a digital society. - ANSWER property rights and
obligations
_______ scans data and can help identify a man at a ticket counter who shares a phone
number with a known terrorist - ANSWER NORA
Regarding moral dimensions of the information age, ________ include(s) the issue of
who can and will be held liable for harm done to property rights. - ANSWER
accountability and control
The act that aims at protecting medical records is the - ANSWER HIPAA
The Internet has made intellectual property - ANSWER difficult to protect
________ refers to the principles of right and wrong that individuals use to make
choices. - ANSWER ethics
The Children's Online Privacy Protection Act (COPPA) focuses on ________. -
ANSWER parental permissions
________ businesses gather and sell personal information to government agencies. -
ANSWER data broker businesses
Copyright protects creators (corporate-owned) of intellectual property for ________. -
ANSWER 95 years after initial creation
Advances in data storage techniques and the rapidly declining costs of data storage
threaten _____ - ANSWER individual privacy
Regarding moral dimensions of the information age, ________ is the standard by which
cultural values are evaluated and supported in a digital society. - ANSWER quality of life
________ are small text files loaded on a computer when a user visits Web sites. -
ANSWER Cookies
, Regarding moral dimensions of the information age, ________ include(s) the issue of
determining the data that individuals and organizations can protect. - ANSWER
information rights and obligations
The "patent trial of the century" in 2011 was between ___________ and ___________
for violating patents for iPhones - ANSWER Apple; Samsung
Which of the following is NOT part of the analysis of a situation that presents an ethical
issue? - ANSWER Avoid actions with extremely low failure costs
Formalizing standards, rules and procedures to ensure that the organization's general
and application security controls are properly executed and enforced is a(n)
___________ control - ANSWER administrative
Public key encryption uses ______ key(s) - ANSWER two
The most commonly used authentication technique used for end users is
____________ - ANSWER password
Viruses differ from worms because worms - ANSWER can operate on their own without
attaching to other computer program files
___________ is a method for encrypting network traffic on the web - ANSWER SSL
An information systems __________ examines a firm's overall security environment and
determines if the organization is properly prepared to address threats - ANSWER audit
If someone sends you an email trying to appear as a normal site that you commonly
visit to obtain unauthorized information, the person is __________ - ANSWER phishing
A ____________ is a program that monitors information traveling over a network and
_______ - ANSWER sniffer; is never legitimately used
IS security firewalls are an example of a _________ - ANSWER gatekeeper
__________ is used to ensure the person is who he/she claims to be - ANSWER
Authentication
In 2002, the ________ Act was passed to help protect investors with new financial
statements reforms - ANSWER Sarbanese-Oxley
Someone who intends to gain unauthorized access to a computer system is considered
to be a __________ - ANSWER hacker
SQL injection attacks are related to _____________ - ANSWER databases