Filters
Question type

Study Flashcards

Which of these actions have Western nations taken to fight cybercrime?


A) Protected only the individual's intellectual property.
B) Guaranteed only personal information privacy.
C) Accessed public information strictly for the private good.
D) Some nations protected personal privacy and others accessed private information for the public good.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

How has the increase in information technology affected criminal activities globally?


A) Crime has remained about the same.
B) Crime has decreased due to better monitoring efforts.
C) The need for government cooperation has been reduced.
D) New mechanisms for stealing data, trafficking contraband and laundering money have emerged.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.

A) True
B) False

Correct Answer

verifed

verified

True

What have businesses done to manage personal information about their employees and customers? Identify a specific company that has taken action and discuss the results.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Businesses have implemented various meas...

View Answer

Most U.S.state laws permit the monitoring of employees through:


A) Tracking software.
B) Eavesdropping on phone calls.
C) Recording computer keystrokes.
D) All of the above.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In 2013,North Korea opened Internet access to which group of people?


A) All of its natural citizens.
B) South Korean residents.
C) Foreigners using mobile devices and laptops.
D) Investors of Koryolink, a state-owned telecommunications company.

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Discuss the motivations of cyber criminals.Explain the costs that cybercrime have on businesses,governments and individuals.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Cyber criminals are motivated by a varie...

View Answer

Downloading illegal files,spreading computer viruses,and stealing from online bank accounts is collectively referred to as:


A) Hacking.
B) Software piracy.
C) Cybercrime.
D) Internet censorship.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.

A) True
B) False

Correct Answer

verifed

verified

True

This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:


A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks (IDAWA) .
D) Data Privacy Day.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Which of these steps has the U.S.recently taken to counter cybercrime?


A) Setup a system of voluntary cybersecurity standards.
B) Opened a new center dedicated to managing cyber activities.
C) Passed sweeping new legislation that required Internet providers to guarantee security.
D) Both A and B, but not C.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:


A) Uniquely identify an individual's shopping habits and preferences.
B) Collect individual social security numbers.
C) Identify an individual shopper using only four bits of secondary information.
D) Both A and C, but not B.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Supporters of digitized medical records claim that:


A) The number of common medical errors has remained constant.
B) Computerized prescription-ordering systems avoided over seven million mistakes.
C) Electronic alerts prevented dangerous drug combinations from being prescribed.
D) Both B and C, but not A.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which of the following is true about the U.S.government's PRISM program?


A) Technology companies could voluntarily turn over individual private communications.
B) The clandestine program was hidden by Edward Snowden.
C) Critics of the program called it an unwarranted intrusion by Big Brother.
D) Google challenged the program rules and won.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

C

Discuss some of the interventions that different governments have taken to control information technology in their nations.How have these steps affected individual privacy rights as well as public security?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

There are various interventions that dif...

View Answer

The primary reason that governments try to keep pace with technology is to:


A) Control the speed of innovation.
B) Manage the cost of technology.
C) Ensure that the public is protected.
D) Avoid threats to individuals.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:


A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

In 2014,the country with the highest percentage of unlicensed software users was Venezuela.

A) True
B) False

Correct Answer

verifed

verified

The Center for Strategic and International Studies recently reported that the global costs of cybercrime run as high as $1 million.

A) True
B) False

Correct Answer

verifed

verified

A CIO is the company's:


A) Chief intelligence officer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 52

Related Exams

Show Answer