Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Development
Q:
(p. 327) Which 2010 Act, passed to control risk in financial markets, is the biggest surge in economic regulation since the New Deal?
A. The Dodd-Frank Act
B. The Expedited Funds Availability Act
C. The Tax Extenders and Alternative Minimum Tax Relief Act
D. The Congressional Accountability Act
Q:
One problem with the Address Verification System (AVS) for fraud prevention is the number of false positives, meaning that the merchant rejects a valid order. One reason for these rejects is simply that cardholders make mistakes in inputting their addresses or zip codes.
Q:
(p. 326) To administer the Troubled Asset Relief Program, Congress created a new agency in the Treasury Department known as the:
A. Office of the Comptroller of the Currency.
B. Office of Financial Stability.
C. Office of Financial Institutions.
D. Office of Government Financial Policy.
Q:
Because of their visibility and large sales volumes, larger firms are more susceptible to fraud than medium-sized firms.
Q:
(p. 326) The _____ was a program that gave federal regulators power to exchange funds for an ownership interest in banks and corporations.
A. Troubled Asset Relief Program
B. Temporary Liquidity Guarantee Program
C. NCUA Corporate Stabilization Program
D. Commercial Paper Funding Facility Program
Q:
Recent surveys by CyberSource indicate that fraudulent card transactions are a growing problem for online merchants in spite of their increasing efforts to combat fraud despite improved anti-fraud measures.
Q:
(p. 326) Which Act was passed by Congress in 2008 to restore financial stability?
A. The Expedited Funds Availability Act
B. The Emergency Economic Stabilization Act
C. The Congressional Accountability Act
D. The Tax Extenders and Alternative Minimum Tax Relief Act
Q:
In the online world, merchants are not held liable for fraudulent transactions.
Q:
(p. 325) Which of the following statements is true about the Department of Homeland Security?
A. It issues rules affecting every industry.
B. Its budget is almost 10 times that of the next largest agency, the EPA.
C. It has 60,000 employees.
D. It is primarily a business regulator.
Q:
For a given type of payment card and processing system, the processes and participants are essentially the same for offline (card present) and online (card not present) purchases.
Q:
(p. 325) _____ is the process of removing or substantially reducing the body of control covering an industry.
A. Liberalization
B. Privatization
C. Globalization
D. Deregulation
Q:
Credit cards, charge cards, and debit cards are three forms of online payment cards.
Q:
(p. 324) Which of the following is true regarding the executive agency?
A. The administrator can be removed only for cause.
B. It is an independent agency.
C. It is run by a single administrator.
D. The administrator is nominated by the Senate and confirmed by the president.
Q:
The processing of card payments has two major phases: identification and settlement.
Q:
In the settlement process, the systems must determine whether a buyer's card is active and whether the cardholder has sufficient funds available for the purchase.
Q:
(p. 323) As a response to the economic depression in 1932, President Franklin D. Roosevelt proposed the ____, a series of programs to bring "Relief, Recovery, and Reform."
A. New Deal
B. Square Deal
C. Fair Deal
D. New Frontier
Q:
Discuss the Bipartisan Campaign Reform Act of 2002 (BCRA). What are its three main provisions?
Q:
E-payment methods that can address the lower or higher end of the price continuum are unlikely to be widely accepted because of cost and security issues.
Q:
To succeed, special e-payment methods, such as e-cash, have to maintain anonymity.
Q:
Define the following lobbying methods: contact lobbying, background lobbying, and grassroots lobbying.
Q:
The success of an e-payment method depends on its interoperability with existing enterprise systems and applications.
Q:
Define peak associations, trade associations, Washington offices, and coalitions.
Q:
E-payment systems that require the payer to install specialized security software have proven more likely to succeed.
Q:
What are the major reasons for the diffusion of power in the government? Discuss.
Q:
How did the rise of antagonistic groups impact the business environment?
Q:
The overwhelming majority of B2C purchases are paid for by smart cards.
Q:
In the online world, virtually every attempt to disintermediate cash and credit cards has failed.
Q:
(p. 281-282) How did the political and business climate change after World War II?
Q:
The barrier to selling books online, either hardcopy or electronic, is technical and not financial.
Q:
What is the New Deal? Discuss the impact of the New Deal measures on businesses.
Q:
An EC security strategy and program begins with
A) the commitment and involvement of executive management.
B) layers of hardware and software defenses.
C) information security policies and training.
D) secure design of EC applications.
Q:
(p. 278-279) Discuss the ascendancy of business, corruption, and reform during the 19th century.
Q:
A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address best defines
A) data wrapping.
B) message envelope.
C) protocol tunneling.
D) Trojan horse.
Q:
What is the First Amendment and how is it critical to business? What rights are guaranteed by the First Amendment?
Q:
Advantages of virtual private networks include each of the following except
A) they are less expensive than private leased lines because they use the public Internet to carry information.
B) they ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.
C) they can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.
D) remote users can use broadband connections rather than make long distance calls to access an organization's private network.
Q:
What are the three main features of the U.S. Constitution?
Q:
A mathematical computation that is applied to a message, using a private key to encrypt the message, best defines
A) locking code.
B) Sharpe ratio.
C) hash.
D) standard deviation.
Q:
(p. 287) Define lobbying.
Q:
A summary of a message converted into a string of digits after the hash has been applied best describes
A) reference rate.
B) message digest.
C) digital certificate.
D) key code.
Q:
(p. 286) What is meant by a "Washington office"?
Q:
Security functions or characteristics of digital signatures include all of the following except
A) a digital signature is the electronic equivalent of a personal signature, which can be forged.
B) digital signatures are based on public keys for authenticating the identity of the sender of a message or document.
C) digital signatures ensure that the original content of an electronic message or document is unchanged.
D) digital signatures are portable.
Q:
(p. 284) What is a peak association?
Q:
The large number of possible key values created by the algorithm to use when transforming the message best describes
A) determinate.
B) encryption code.
C) encryption lock.
D) key space.
Q:
What is meant by separation of powers?
Q:
The mathematical formula used to encrypt the plaintext into the ciphertext, and vice versa best defines
A) key space.
B) encryption algorithm.
C) locking algorithm.
D) public key infrastructure.
Q:
Fingerprint scanners, facial recognition systems, and voice recognition are examples of ________ that recognize a person by some physical trait.
A) biometric systems
B) human firewalls
C) intrusion detection systems
D) access control lists
Q:
(p. 275) Define the federal system.
Q:
(p. 302) An express advocacy communication that is not coordinated with a candidate is known as a(n):
A. independent expenditure.
B. bundle expenditure.
C. hard expenditure.
D. soft expenditure.
Q:
Each of the following is a characteristic of access control except
A) access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she, or it can use.
B) access control lists (ACLs) define users' rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
C) all resources need to be considered together to identify the rights of users or categories of users.
D) after a user has been identified, the user must be authenticated.
Q:
(p. 302) _____ occurs when an individual solicits multiple contributions for a candidate, then bunches them together and passes them on.
A. Trading
B. Lobbying
C. Bundling
D. Peaking
Q:
A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes
A) vulnerability assessment.
B) penetration test.
C) security breach.
D) cyber audit.
Q:
(p. 299) Which of the following statements about the Bipartisan Campaign Reform Act is true?
A. It prohibited the national parties from raising and spending hard money.
B. To compensate for the loss of hard money funds, contribution limits for individuals were raised.
C. It prohibited corporations and unions from directly funding "issue ads."
D. It made it illegal for corporations and unions to make contributions from their treasuries to advocacy groups.
Q:
Which of the following refers to the process of identifying, quantifying, and prioritizing the vulnerabilities in a system?
A) vulnerability assessment
B) feasibility assessment
C) initial security report
D) certification audit
Q:
(p. 298) _____ advocacy suggests the election or defeat of a candidate using specific words like "vote for," "defeat," or "support."
A. Ideological
B. Express
C. Bureaucratic
D. Issue
Q:
Which of the following refers to the assurance that access to data, the website, or other EC data service is timely, available, reliable, and restricted to authorized users?
A) spontaneity
B) confidentiality
C) integrity
D) availability
Q:
(p. 298) _____ advocacy presents a political view or comment on an electoral race.
A. Issue
B. Ideological
C. Bureaucratic
D. Express
Q:
Which of the following refers to the assurance of data privacy and accuracy?
A) integrity
B) availability
C) confidentiality
D) security
Q:
(p. 298) Money that is raised and spent under the strict contribution limits and rules in federal election law is called:
A. soft money.
B. earnest money.
C. easy money.
D. hard money.
Q:
The success and security of EC can be measured by
A) encryption, functionality, and privacy.
B) quality, reliability, and speed.
C) authentication, authorization, and nonrepudiation.
D) confidentiality, integrity, and availability.
Q:
(p. 298) Money contributed to political candidates that is unregulated as to source or amount under federal election law is called:
A. direct money.
B. soft money.
C. earnest money.
D. hard money.
Q:
A page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's ranking best describes
A) Trojan page.
B) spam site.
C) zombie.
D) search engine imposter.
Q:
(p. 297) What is the election cycle?
A. It is the two-year period between state elections.
B. It is the time period between the declaration of the election date to the campaigning.
C. It is the two-year period between federal elections.
D. It is the time period between casting the ballot to the declaration of the results.
Q:
Software that gathers user information over an Internet connection without the user's knowledge best defines
A) spyware.
B) Trojan horse.
C) zombie.
D) search engine spam.
Q:
A botnet is a
A) collection of a few hundred hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
B) piece of software code that inserts itself into a host or operating system to launch DoS attacks.
C) piece of code in a worm that spreads rapidly and exploits some known vulnerability.
D) coordinated network of computers that can scan and compromise other computers and launch DoS attacks.
Q:
(p. 296) A governmental committee formed by a company that makes campaign contributions by getting money from individual employees, not the corporate treasury, is called a:
A. political action committee.
B. subcommittee.
C. progressive change committee.
D. joint committee.
Q:
(p. 294) Which Act, did the Progressive reformers pass in 1907, making it a crime for banks and corporations to directly contribute to candidates in federal elections?
A. The Bipartisan Campaign Reform Act
B. The Hatch Act
C. The Tillman Act
D. The Federal Election Campaign Act
Q:
Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler. Once there, an unsuspecting user is redirected to malicious websites. This description is indicative of
A) electronic splogging.
B) cyberworming.
C) page hijacking.
D) spamming.
Q:
(p. 293) Which of the following is true regarding bribery?
A. Ordinary contributions given to curry general favor are prosecuted.
B. Whether something is a bribe depends heavily on context and situation.
C. When lobbyists entertain legislators at receptions, they are engaging in criminal bribery.
D. A campaign contribution that does not involve an agreed upon exchange is still considered a bribe.
Q:
An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources best describes
A) cyberraid.
B) denial-of-service attack.
C) cyberhijacking.
D) botnet infestation.
Q:
(p. 293) In case of ____, the action might have been or might be taken even in the absence of the gift.
A. rigging
B. bribery
C. illegal gratuity
D. lobbying
Q:
A software program that runs independently, consuming the resources of its host in order to maintain itself, that is capable of propagating a complete working version of itself onto another machine best describes
A) splog.
B) tidal wave.
C) Trojan horse.
D) worm.
Q:
(p. 293) _____ occurs when a lawmaker or official seeks or receives anything of value because of an official action taken in the past or to be performed in the future.
A. Illegal gratuity
B. Rigging
C. Bribery
D. Lobbying
Q:
A program that appears to have a useful function but that contains a hidden function that presents a security risk best defines
A) virus.
B) worm.
C) Trojan horse.
D) botnet.
Q:
(p. 292-293) _____ occurs when a lawmaker or official asks for, is offered, or receives something valuable in return for being influenced to perform an official act.
A. Lobbying
B. Bribery
C. Illegal gratuity
D. Rigging
Q:
A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization's brand, identity, website, e-mail, information, or other asset and attempts to defraud the organization, its customers, and employees best describes
A) feasibility assessment.
B) EC security strategy.
C) information systems security plan.
D) disaster recovery plan.
Q:
(p. 291) Which of the following statements is true about the regulation of lobbyists?
A. Lobbyists have been regulated since 1946, when they were first required to register with the clerks of the House and Senate.
B. The Lobbying Disclosure Act requires individuals and corporations engaged in lobbying to register with the House of Commons.
C. Four times a year, the individuals and corporations engaged in lobbying must disclose their political contributions to candidates.
D. The House and the Senate have adopted different rules to prevent the appearance of impropriety.
Q:
The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as
A) information assurance.
B) data integrity.
C) information integrity.
D) human firewall.
Q:
(p. 290) The technique of generating public support for the position of a company, industry, or any interest is known as:
A. background lobbying.
B. grassroots lobbying.
C. channel lobbying.
D. contact lobbying.
Q:
The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as
A) integrity.
B) availability.
C) authentication.
D) nonrepudiation.
Q:
(p. 290) In background lobbying, lobbyists:
A. try to raise awareness of a particular cause at the local level.
B. carry out activities that are designed to build friendly relations with lawmakers, officials, and staffs.
C. try to generate public support for the position of a company, industry, or any interest.
D. carry out direct interaction with government officials or staffs through meetings, phone calls or e-mails.