Site MapHelpFeedbackChapter Quiz
Chapter Quiz
(See related pages)

1
Which of the following is considered an exercise of corporate power?
A)Product pricing
B)Employee health screen
C)Advertising content
D)Plant closures or downsizing
2
The _____________ theory of ethical decision making states that companies have ethical responsibilities to all members of society. They should enhance the economic satisfaction of consumers and employees, without polluting the environment or depleting natural resources, misusing political power, or subjecting their employees to dehumanizing working conditions.
A)social contract
B)stakeholder
C)stockholder
D)equity
3
All of the following are basic categories of ethical business issues except:
A)Equity
B)Rights
C)Exercise of corporate power
D)Financial power
4
All of the following are AITP standards of professional conduct related to an employee's obligation to an employer except:
A)Protect the privacy and confidentiality of all information entrusted to me
B)Do not misrepresent or withhold information that is germane to the situation
C)Do not exploit the weakness of a computer system for personal gain or personal satisfaction
D)Support, respect, and abide by the appropriate local, state, provincial, and federal laws
5
Computer crime poses serious threats to the _______________ of most business systems.
A)integrity
B)safety
C)survival
D)All of the choices are correct.
6
All of the following are included in the top 5 virus families of all time except:
A)Sasser
B)SoBig
C)Netsky
D)Pilfer
7
Which of the following statements about cyber law is false?
A)The intersection of technology and the law is often controversial
B)Cyber law encompasses a wide variety of legal and political issues related to the Internet and other communications technologies
C)Cyber law is a term that has existed since the 1940's, when computers first emerged
D)All the choices are true statements about cyber law.
8
The goal of security management is to:
A)Design healthy work environments that are safe, comfortable, and pleasant for people to work in
B)Ensure the accuracy, integrity, and safety of all information system processes and resources
C)Ensure the access and effective use of all information system processes and resources
D)Design policies to ensure the privacy of personal information
9
Denial of service assaults via the Internet depend on three layers of networked computer systems. Which of the following is not one of those layers?
A)The victim's website
B)The victim's Internet service provider
C)The sites of "zombie" or slave computers that were commandeered by the cyber criminal
D)E-mail
10
Which of the following security techniques offers the highest accuracy, although higher in cost than other biometric techniques?
A)Dynamic signature verification
B)Finger scan
C)Passive iris scan
D)Voice print







O'BrienOnline Learning Center

Home > Chapter 13 > Chapter Quiz