Ch3_review - Question 1 0 out of 0 points What is the subject of the Computer Security Act Selected Answer a Federal Agency Information Security

Ch3_review - Question 1 0 out of 0 points What is the...

This preview shows page 1 - 3 out of 9 pages.

Question 1 0 out of 0 points What is the subject of the Computer Security Act? Question 20 out of 0 pointsCultural differences can make it difficulty to determine what is ethical and is not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal. Question 30 out of 0 pointsThe __________ of 1999 provides guidance on the use of encryption and provides protection from government intervention. Question 40 out of 0 pointsWhich of the following countries reported the least tolerant attitudes toward personal use of organizational computing resources? Question 50 out of 0 pointsThe Economic Espionage Act of 1996protects American ingenuity, intellectual property,and competitive advantage. _________________________ Question 6 0 out of 0 points The __________ attempts to prevent trade secrets from being illegally shared. Question 70 out of 0 pointsWhich of the following acts is also widely known as the Gramm-Leach-Bliley Act?
Image of page 1
Question 80 out of 0 pointsThe code of ethics put forth by (ISC)2focuses on four mandatory canons: “Protect society, the commonwealth, and the infrastructure; act honorably, honestly, justly, responsibly, and legally; provide diligent and competent service to principals; and advance and protect the profession.”. _________________________ Question 90 out of 0 pointsAccording to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except __________. Question 100 out of 0 pointsIn the context of information security, confidentiality is the right of the individual or group to protect themselves and their information from unauthorized access. Question 110 out of 0 pointsDue care and due diligence require that an organization make a valid effort to protect others and continually maintain this level of effort, ensuring these actions are effective.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 9 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture