Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Development
Q:
The process of verifying the real identity of an individual, computer, computer program, or EC website best defines
A) vulnerability assessment.
B) security audit.
C) authentication.
D) authorization.
Q:
(p. 288) Direct interaction with government officials or staff through meetings, phone calls, or e-mails is known as:
A. background lobbying.
B. grassroots lobbying.
C. media lobbying.
D. contact lobbying.
Q:
The process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform is known as
A) integrity.
B) availability.
C) authorization.
D) nonrepudiation.
Q:
(p. 287) When a business hires a person in order to advocate a position to the government, it is said to be indulging in:
A. corruption.
B. campaigning.
C. lobbying.
D. coalescing.
Q:
According to Sullivan (2011), the vulnerabilities in Business IT and EC systems include each of the following organizational weaknesses except
A) end-user training and security awareness.
B) lax security with mobile devices.
C) inappropriate use of business computers and network services.
D) closed systems not reacting quickly enough to security breaches.
Q:
(p. 287) What are the two broad areas of business involvement in politics?
A. Lobbying and electoral activity
B. Lobbying and bribery
C. Gratuity and electoral activity
D. Bribery and gratuity
Q:
According to Sullivan (2011), vulnerabilities in IT and EC systems include each of the following except
A) poor application security.
B) weak boundary security.
C) lack of environmental support.
D) unencrypted communications.
Q:
(p. 286) A combination of business interestsincluding corporations, trade associations, and peak associationsunited to pursue a political goal is known as a(n):
A. institution.
B. legation.
C. coalition.
D. agency.
Q:
A malicious hacker who may represent a serious problem for a corporation best describes a
A) cyberspy.
B) cracker.
C) web surfer.
D) Internet commando.
Q:
(p. 286) A Washington Office is:
A. set up by a corporation to pursue a political goal.
B. set up by a corporation and staffed with experts in advocating the firm's point of view to lawmakers and regulators.
C. an office that represents the political interests of many companies and industries.
D. an office that represents the interests of an industry or industry segment.
Q:
Someone who gains unauthorized access to a computer system best describes a
A) hacker.
B) network technician.
C) cyberwarrior.
D) cyberseeker.
Q:
(p. 285) A _____ is a group representing the interests of an industry or industry segment.
A. business roundtable
B. peak association
C. business alliance
D. trade association
Q:
Unintentional threats include each of the following except
A) human errors.
B) environmental hazards.
C) computer system malfunctions.
D) identity theft.
Q:
(p. 285) Which of the following is the largest and most powerful peak association in the United States?
A. The National Federation of Independent Businesses
B. The National Association of Manufacturers
C. The U.S. Chamber of Commerce
D. The Business Roundtable
Q:
Computers infected with malware that are under the control of a spammer, hacker, or other criminal best describes
A) fraud servers.
B) electronic defenders.
C) zombies.
D) cyber warriors.
Q:
(p. 284) A group that represents the political interests of many companies and industries is called a:
A. peak association.
B. business association.
C. trade association.
D. sector association.
Q:
A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network best describes
A) splog.
B) social engineering.
C) viral email.
D) identity theft.
Q:
(p. 284) Which of the following is a major reason for the diffusion and decentralization of power in the government?
A. Congress dominated by a few major leaders.
B. Lack of reforms in Congress.
C. The rise of political parties.
D. Increased complexity of government.
Q:
The probability that a vulnerability will be known and used best describes
A) risk.
B) feasibility.
C) security fault.
D) splog point.
Q:
(p. 283) After 1974, subcommittees:
A. typically had to seek permission from the Congress before taking any actions.
B. were dominated by a few leaders.
C. could hold hearings on any subject they wished.
D. started having small staffs.
Q:
A generic term for malicious software is
A) NOS.
B) ad-aware.
C) spynet.
D) malware.
Q:
(p. 282) Which of the following is accurate regarding the rise of antagonistic groups?
A. New groups that focused on consumer, environmental, taxpayer, civil rights, and other issues were on the rise.
B. Corporations continued dominating Washington politics with quiet, behind-the-scenes influence over key leaders.
C. The public interest movement's focus is now on legislation, not on forms of civil regulation.
D. The power in Washington, D.C. started becoming more centralized.
Q:
The estimated cost, loss, or damage that can result if a threat exploits a vulnerability best describes
A) total cost of ownership.
B) present value of risk.
C) exposure.
D) risk feasibility assessment.
Q:
A plan that keeps the business running after a disaster occurs best defines
A) security audit specifications.
B) business continuity plan.
C) vulnerability assessment plan.
D) project initiation plan.
Q:
(p. 281) The New Deal was a political sea change born out of the Great Depression. Which of the following is a lasting legacy of the era?
A. The government should spend more on infrastructure programs that promoted business rather than social programs.
B. The philosophy that government should be used to correct the flaws of capitalism and control the economy.
C. The view that government should lay the groundwork for a large, powerful, and activist worker's state.
D. The government should not interfere with corporations.
Q:
________ is a crimeware technique used to steal the identity of target companies to get the identities of their customers.
A) Spamming
B) Pretexting
C) Social engineering
D) Phishing
Q:
(p. 280) Franklin D. Roosevelt's efforts to regulate banking and industry, strengthen labor unions, and enact Social Security came to be known as the:
A. Fair Deal.
B. Square Deal.
C. Great Society.
D. New Deal.
Q:
________ systems are highly useful for both law enforcement and for law breaking, for example, by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.
A) Biometric
B) Keystroke logging
C) Access control
D) Intrusion detection
Q:
(p. 280) Which amendment to the U.S. Constitution gave women the right to vote in elections?
A. The First Amendment
B. The Seventeenth Amendment
C. The Nineteenth Amendment
D. The Tenth Amendment
Q:
________ refers to the e-markets for stolen information.
A) Internet underground economy
B) Denial of service
C) Cybercriminal
D) Virtual private network
Q:
(p. 279) Which of the following statements about the Seventeenth Amendment is true?
A. It instituted the direct election of senators by voters in each state.
B. It gave women the right to vote.
C. It gave companies the freedom to lobby.
D. It defined monetary campaign contributions as a form of speech.
Q:
The ________ translates or converts domain names to their IP addresses.
A) IPS
B) DOS
C) VPN
D) DNS
Q:
(p. 279) During the 19th century, the Anti-Saloon League:
A. advocated the use of alcohol.
B. became a strong national adversary of business.
C. was destined to be the strongest single element opposing industry over the following century.
D. accepted money for granting favors to corporations.
Q:
(p. 279) Which of the following were formidable business adversaries that emerged during the 19th century?
A. Organized labor and the Anti-Saloon League
B. The Progressive movement and the Modern Whig Party
C. The Populist movement and the Progressive movement
D. The Anti-Saloon League and the Populist movement
Q:
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction best defines
A) information security.
B) security audit.
C) anti-virus protection.
D) incident management.
Q:
(p. 278) Which of the following is true about the business scenario during the 19th century?
A. After the Civil Wars, agriculture started dominating industries.
B. West Virginia and Kentucky were controlled by railroads.
C. The presence of business was least in Washington, D.C.
D. The Southern American states were more dependent on agriculture prior to the Civil Wars.
Q:
Due care in EC are those actions that a company is reasonably expected to take based on the risks affecting its business and online transactions.
Q:
(p. 277) The First Amendment:
A. gives each state sovereign immunity from being sued in federal court by someone of another state or country.
B. allows the Congress to levy tax without appointing it among the states or basing it on Census results.
C. protects rights of free speech, freedom of the press, and freedom of assembly.
D. gives defendants in criminal cases the right to a speedy trial.
Q:
Acceptable use policies (AUP) inform users of their responsibilities when a cyberattack or network intrusion has occurred.
Q:
The success of an EC security strategy and program depends on the commitment and involvement of senior management.
Q:
(p. 277) The _____ protects the right of business to organize and press its agenda on the government.
A. Sixteenth Amendment
B. First Amendment
C. Sixth Amendment
D. Eleventh Amendment
Q:
(p. 277) The First Amendment is an amendment to the Constitution added in 1791 as part of the:
A. Bill of Rights.
B. Declaration of Independence.
C. USA PATRIOT Act.
D. Natural and Legal Rights.
Q:
Ninety-three percent of companies that suffer a significant data loss go out of business within 5 years.
Q:
Risk aversion is an approach oriented toward prevention and seeks to minimize the chance of avoidable disasters.
Q:
(p. 276) Which of the following is true regarding the government structure created by the American Constitution?
A. It concentrates power.
B. It invites business and other interests to attempt to influence the government.
C. It does not require cooperation between levels and branches of government that share power.
D. It creates a single point of access.
Q:
(p. 276) The power of judges to review legislative and executive actions and strike down laws that are unconstitutional or acts of officials that exceed their authority is known as:
A. judicial supremacy.
B. judicial review.
C. merit review.
D. legislating.
Q:
Splogs are software applications that have some degree of reactivity, autonomy, and adaptability. An agent is able to adapt itself based on changes occurring in its environment.
Q:
(p. 276) Separation of powers is the constitutional arrangement that separates the power of the:
A. federal government from the state governments.
B. central government of a sovereign state from the government at a subnational level.
C. elected legislature from other estates which are subservient to it.
D. legislative, executive, and the judicial functions of the national government into three branches.
Q:
General controls are intended to protect specific applications.
Q:
(p. 275-276) Which of the following is true regarding the U.S. Constitution?
A. It sets up a unitary state.
B. It establishes a system under which the legislative, executive, and judicial functions of the government are integrated with each other.
C. The judges have no power to review legislative and executive actions.
D. It makes the federal government more powerful than the governments of the individual states.
Q:
A honeypot is a production system that looks like it does real work, but acts as a decoy and is watched to study how network intrusions occur.
Q:
(p. 275) The _____ in the Constitution, Article VI, Section 2, sets forth the principle that when the federal government passes a law within its powers, the states are bound by that law.
A. First Amendment
B. separation of powers clause
C. supremacy clause
D. Tenth Amendment
Q:
(p. 275) A government in which powers are divided between a central government and subdivision governments is called a(n):
A. federal system.
B. unitary system.
C. confederation system.
D. devolved system.
Q:
An intrusion detection system uses the public Internet to carry information but remains private by using encryption, authentication, and access control to verify the identity of anyone using the network.
Q:
A digital envelope is the combination of the encrypted original message and the digital signature, using the recipient's public key.
Q:
(p. 271) An amount of money for a project added into an appropriations bill by any member of the Senate or House of Representatives is known as a(n):
A. budget proviso.
B. grant fund.
C. earmark.
D. competitive grant.
Q:
Biometric systems are authentication systems that identify a person by measurement of a biological characteristic, such as fingerprints, iris patterns, facial features, or voice.
Q:
(p. 294) In 1907, Progressive reformers passed the Adamson Act, making it a crime for banks and corporations to directly contribute to candidates in federal elections.
Q:
Access control is a mechanism that determines who can legitimately use a network resource.
Q:
(p. 293) Illegal gratuity refers to an agreement to exchange something of value for an official act.
Q:
Malvertising is fake online advertising designed to trick you into downloading malicious software onto your computer.
Q:
(p. 291-292) According to the Lobbying Disclosure Act, individuals and corporations engaged in lobbying have to disclose their political contributions to candidates, parties, and committees four times a year.
Q:
Girlfriend Trojans come to life when computer owners visit one of a number of online banking or e-commerce sites.
Q:
(p. 291) Lobbyists have been regulated since 1946, when they were first required to register with the clerks of the House and Senate.
Q:
Network viruses can enter through unprotected ports and compromise the whole network.
Q:
(p. 290) The technique of generating the public's support for the position of a company is called grassroots lobbying.
Q:
A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.
Q:
(p. 289) Lobbyists often meet with a legislator's staff and sometimes work with them to draft legislation.
Q:
Spam and spyware are the most frequently used technical security attack methods used by cybercriminals.
Q:
(p. 288) Lobbyists have huge power over broad liberal and conservative tides and headline issues to which the public is attentive.
Q:
Phishing is an example of a technical attack.
Q:
(p. 287) Business involvement in politics can take the form of lobbying, in which business exercises influence by advocating positions to lawmakers and officials.
Q:
Detection measures are actions that will make criminals abandon their idea of attacking a specific system.
Q:
(p. 286) A coalition refers to business interestsincluding corporations, trade associations, and peak associationsunited to pursue a political goal.
Q:
Validation is the assurance that online customers or trading partners cannot falsely deny their purchase or transaction.
Q:
(p. 285) The largest and most powerful peak association is the U.S. Legislative Exchange Council, which was founded in 1912.
Q:
Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.
Q:
(p. 284) A peak association refers to a group that represents the political interests of the industrial market leader.
Q:
Social engineering refers to criminals tricking unsuspecting people into giving them information or access that they should not have.
Q:
(p. 283) After 1974, subcommittees could hold hearings on any subject they wished.