142 a set of values defining acceptable and

Info icon This preview shows pages 11–13. Sign up to view the full content.

View Full Document Right Arrow Icon
142 A set of values defining acceptable and unacceptable behavior is known as A. Ethics B. Guiding principles C. Laws D. Requirements Answer: A See Chapter 9. Ethics define right and wrong behavior. Various organizations @@md including (ISC)² @@md have codes of ethics that define right and wrong in various contexts. 143 During an interrogation of a suspect, copies of any evidence should be used because A. The suspect may ask for the evidence. B. The suspect may attempt to destroy the evidence. C. The original evidence should be locked in the evidence room. D. The suspect is allowed to give a copy of the evidence to his or her attorney. Answer: B See Chapter 9. It would be unfortunate if a suspect destroyed evidence that investigators worked so hard to produce. 144 Federal sentencing guidelines specify that a corporation’s senior officers can be
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
A. Imprisoned for failing to protect corporate information assets from harm B. Held personally liable for failing to protect information assets from harm C. Sentenced to house arrest for failing to protect information assets from harm D. Barred from management for failing to protect information assets from harm Answer: B See Chapter 9. Senior officers can be personally liable for up to $290 million for failure to comply with the law. 145 The owner of a patent is protected for how long in the United States? A. 20 years B. 7 years C. 10 years D. 27 years Answer: A See Chapter 9. A patent protects its owner's right to solely market his or her invention for 20 years (effective June 8, 1995). Before this ruling, the patent protections lasted for only 17 years. 146 Laws having to do with a wrong that one has inflicted on another are called A. Statutory laws B. Common laws C. Civil laws D. Liability laws Answer: C See Chapter 9. Laws that deal with one person or organization damaging another are civil laws. 147 The U.S. government program that requires shielding and other mechanisms designed to prevent the emanation of radio frequency (RF) signals generated by computer equipment is called A. AURORA B. TEAPOT C. RIVEST D. TEMPEST Answer: D See Chapter 6. TEMPEST is the name of the program that developed standards for shielding facilities to prevent radio frequency
Image of page 12
(RF)@@ndcontaining secret information from radiating from buildings. 148 The deliberate misuse of information is prohibited by A. The U.S. Federal Trade Commission B. The Heisenberg Principle C. The Fourth Amendment of the U.S. Constitution D. The (ISC) 2 Code of Ethics Answer: D See Chapter 9. The (ISC) 2 Code of Ethics prohibits the deliberate misuse of information. 149 The name of the law requiring protection of personal medical information is A. PIPEDA B. HAPPA C. HIPAA D. HIPPA Answer: C See Chapter 9. HIPAA, the Health Insurance Portability and Accountability Act, addresses health care information privacy.
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern