Deck 12: Regulating and Managing Information Technology
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/52
العب
ملء الشاشة (f)
Deck 12: Regulating and Managing Information Technology
1
Creating and distributing viruses on other computers is called hacking.
False
2
In 2013,North Korea opened Internet access to which group of people?
A) All of its natural citizens.
B) South Korean residents.
C) Foreigners using mobile devices and laptops.
D) Investors of Koryolink, a state-owned telecommunications company.
A) All of its natural citizens.
B) South Korean residents.
C) Foreigners using mobile devices and laptops.
D) Investors of Koryolink, a state-owned telecommunications company.
C
3
The primary reason that hackers hack is to make money.
True
4
Researchers for McKinsey & Company along with the World Economic Forum found that many firms struggled to manage the issues of cybercrime.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Center for Strategic and International Studies recently reported that the global costs of cybercrime run as high as $1 million.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
6
One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
7
Electronic medical records are guaranteed to be 100 percent accurate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
8
In 2014,the country with the highest percentage of unlicensed software users was Venezuela.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
9
Bill Joy,Sun Microsystems' chief scientist,warned that the rapid advances of technology:
A) Solve every insurmountable problem in no time flat.
B) Move too fast, and can take on a life of its own.
C) Are the safest and most human friendly known to civilization.
D) Must be controlled by the companies that invest in them to protect society.
A) Solve every insurmountable problem in no time flat.
B) Move too fast, and can take on a life of its own.
C) Are the safest and most human friendly known to civilization.
D) Must be controlled by the companies that invest in them to protect society.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
10
In 2014,a Ponemon Institute study reported that businesses took an average of 60 days to recover from a cyberattack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
11
Governments and businesses understand each other's needs and cooperate fully to manage the benefits and threats of newly introduced technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
12
The U.S.PRISM program was designed primarily to protect public privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
13
How has the increase in information technology affected criminal activities globally?
A) Crime has remained about the same.
B) Crime has decreased due to better monitoring efforts.
C) The need for government cooperation has been reduced.
D) New mechanisms for stealing data, trafficking contraband and laundering money have emerged.
A) Crime has remained about the same.
B) Crime has decreased due to better monitoring efforts.
C) The need for government cooperation has been reduced.
D) New mechanisms for stealing data, trafficking contraband and laundering money have emerged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
14
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which country recently required all video-streaming sites to be approved by the government or risk having their content banned?
A) Iran.
B) Pakistan.
C) North Korea.
D) China.
A) Iran.
B) Pakistan.
C) North Korea.
D) China.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
16
The U.S.government strictly controls the use of GPS and similar tracking devices at the federal level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
17
Many authoritarian governments have expanded Internet censorship in recent years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
18
The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
19
The primary reason that governments try to keep pace with technology is to:
A) Control the speed of innovation.
B) Manage the cost of technology.
C) Ensure that the public is protected.
D) Avoid threats to individuals.
A) Control the speed of innovation.
B) Manage the cost of technology.
C) Ensure that the public is protected.
D) Avoid threats to individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
20
In 2014,NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
21
MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to:
A) Uniquely identify an individual's shopping habits and preferences.
B)
B) Collect individual social security numbers.
C) Identify an individual shopper using only four bits of secondary information.
D) Both A and C, but not
A) Uniquely identify an individual's shopping habits and preferences.
B)
B) Collect individual social security numbers.
C) Identify an individual shopper using only four bits of secondary information.
D) Both A and C, but not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
22
Intellectual property refers to:
A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
A) Protecting one's ideas, concepts, and symbolic creations.
B) Special laws protecting copyrights, patents, and trademarks.
C) Prohibiting the downloading of commercial software or videogames.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
23
Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks?
A) Support from executive leadership.
B) Involvement by all functional departments.
C) Focus on how to respond to a breach.
D) All of the above.
A) Support from executive leadership.
B) Involvement by all functional departments.
C) Focus on how to respond to a breach.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
24
The purpose of the right to be forgotten is to:
A) Increase protection of privacy and personal information.
B) Protect property rights.
C) Protect intellectual property.
D) Prevent software privacy.
A) Increase protection of privacy and personal information.
B) Protect property rights.
C) Protect intellectual property.
D) Prevent software privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
25
In a study of CIOs from around the world,McKinsey & Company found that most CIOs reported to their:
A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
A) Chief executive officer.
B) Chief financial officer.
C) Chief operating officer.
D) Managing supervisor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
26
Hackers who intend to profit from their actions are motived by:
A) The need for media attention.
B) A desire to retaliate against the government.
C) The thrill of it.
D) Financial incentives.
A) The need for media attention.
B) A desire to retaliate against the government.
C) The thrill of it.
D) Financial incentives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which of these statements is (are)true about the group known as Anonymous?
A)
A) They are a tightly bonded group of hacktivists.
B) They are distinguished by masks with an over-sized smile and red cheeks.
C) They supported WikiLeaks and the Occupy movement.
D) Both B and C, but not
A)
A) They are a tightly bonded group of hacktivists.
B) They are distinguished by masks with an over-sized smile and red cheeks.
C) They supported WikiLeaks and the Occupy movement.
D) Both B and C, but not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
28
Downloading illegal files,spreading computer viruses,and stealing from online bank accounts is collectively referred to as:
A) Hacking.
B) Software piracy.
C) Cybercrime.
D) Internet censorship.
A) Hacking.
B) Software piracy.
C) Cybercrime.
D) Internet censorship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
29
Most U.S.state laws permit the monitoring of employees through:
A) Tracking software.
B) Eavesdropping on phone calls.
C) Recording computer keystrokes.
D) All of the above.
A) Tracking software.
B) Eavesdropping on phone calls.
C) Recording computer keystrokes.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is true about the U.S.government's PRISM program?
A) Technology companies could voluntarily turn over individual private communications.
B) The clandestine program was hidden by Edward Snowden.
C) Critics of the program called it an unwarranted intrusion by Big Brother.
D) Google challenged the program rules and won.
A) Technology companies could voluntarily turn over individual private communications.
B) The clandestine program was hidden by Edward Snowden.
C) Critics of the program called it an unwarranted intrusion by Big Brother.
D) Google challenged the program rules and won.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of these actions have Western nations taken to fight cybercrime?
A) Protected only the individual's intellectual property.
B) Guaranteed only personal information privacy.
C) Accessed public information strictly for the private good.
D) Some nations protected personal privacy and others accessed private information for the public good.
A) Protected only the individual's intellectual property.
B) Guaranteed only personal information privacy.
C) Accessed public information strictly for the private good.
D) Some nations protected personal privacy and others accessed private information for the public good.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
32
Software piracy is a major problem in which part of the world?
A) Globally.
B) North America only.
C) Asia only.
D) North America and Asia.
A) Globally.
B) North America only.
C) Asia only.
D) North America and Asia.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
33
This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufactures and their users:
A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
A) Software Business Piracy Act.
B) Digital Millennium Copyright Act.
C) Intellectual Property Millennium Act.
D) Copyright Act of 1998.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
34
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:
A) Software pirates.
B) Comodohackers.
C) Hacktivists.
D) Data trafficking groups.
A) Software pirates.
B) Comodohackers.
C) Hacktivists.
D) Data trafficking groups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
35
Supporters of digitized medical records claim that:
A)
A) The number of common medical errors has remained constant.
B) Computerized prescription-ordering systems avoided over seven million mistakes.
C) Electronic alerts prevented dangerous drug combinations from being prescribed.
D) Both B and C, but not
A)
A) The number of common medical errors has remained constant.
B) Computerized prescription-ordering systems avoided over seven million mistakes.
C) Electronic alerts prevented dangerous drug combinations from being prescribed.
D) Both B and C, but not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
36
Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called:
A) Grey hatters.
B) Black hatters.
C) White hatters.
D) Mad hatters.
A) Grey hatters.
B) Black hatters.
C) White hatters.
D) Mad hatters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
37
Which website received a favorable review because they limited the ability of hackers to take advantage of one another?
A) Hackers for Hire.
B) Hacker's List.
C) Facebook.
D) ISIS.
A) Hackers for Hire.
B) Hacker's List.
C) Facebook.
D) ISIS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of these statements accurately describe hacktivists known as grey hatters?
A) They always work in tight-knit groups.
B) They are highly welcomed by businesses.
C) They seek retaliation on businesses.
D) They seek media attention and profits.
A) They always work in tight-knit groups.
B) They are highly welcomed by businesses.
C) They seek retaliation on businesses.
D) They seek media attention and profits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
39
Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to?
A) Suppress political dissent.
B) Impose religious or ideological views.
C)
C) Increase bandwidth for government usage.
D) A and B, but not
A) Suppress political dissent.
B) Impose religious or ideological views.
C)
C) Increase bandwidth for government usage.
D) A and B, but not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
40
A CIO is the company's:
A) Chief intelligence officer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
A) Chief intelligence officer.
B) Chief information officer.
C) Coordinator of international operations.
D) Controller of internal overhead.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss the motivations of cyber criminals.Explain the costs that cybercrime have on businesses,governments and individuals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
42
Over time the role of the CIO:
A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
A) Has remained the same.
B) Has decreased in level of responsibility.
C) Has changed dramatically, superseding the role of the chief executive officer.
D) Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
43
Discuss the global impact of cybercrime and explain how some international and national groups are fighting it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
44
This international gathering brought together leaders from the United States and dozens of European countries to address the global nature of cyberattacks:
A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks (IDAWA).
D) Data Privacy Day.
A) Cyberattack Awareness Day.
B) Anti-cyber International.
C) International Defense Against Web Attacks (IDAWA).
D) Data Privacy Day.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
45
Explain the concept of the "right to be forgotten." What are its implications to governments,businesses and individuals?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
46
Why is the management and regulation of information technology a challenge for governments and businesses? What are some advantages of the two entities working together?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
47
Discuss some of the interventions that different governments have taken to control information technology in their nations.How have these steps affected individual privacy rights as well as public security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
48
Increased cyber activity by which country prompted NATO officials to brand them as "patriotic hackers"?
A) Russia.
B) Iran.
C) Iraq.
D) Mexico.
A) Russia.
B) Iran.
C) Iraq.
D) Mexico.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
49
What have businesses done to manage personal information about their employees and customers? Identify a specific company that has taken action and discuss the results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is not a role of the CIO?
A) Acting as lead security officer.
B) Educating the organization about technology initiatives.
C) Marketing technology projects to stakeholders.
D) Monitoring the appropriate level of employee headcount.
A) Acting as lead security officer.
B) Educating the organization about technology initiatives.
C) Marketing technology projects to stakeholders.
D) Monitoring the appropriate level of employee headcount.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
51
How is the corporate Chief Information Officer (CIO)a "security guard" for the organization? What are some of the important responsibilities of the CIO?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck
52
Which of these steps has the U.S.recently taken to counter cybercrime?
A) Setup a system of voluntary cybersecurity standards.
B) Opened a new center dedicated to managing cyber activities.
C)
C) Passed sweeping new legislation that required Internet providers to guarantee security.
D) Both A and B, but not
A) Setup a system of voluntary cybersecurity standards.
B) Opened a new center dedicated to managing cyber activities.
C)
C) Passed sweeping new legislation that required Internet providers to guarantee security.
D) Both A and B, but not
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 52 في هذه المجموعة.
فتح الحزمة
k this deck