1.
It is generally agreed that laws and policies and their associated penalties only deter if three conditions are met: fear of penalty; the probability of being caught; and the probability of penalty being administered.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that for laws and policies to effectively deter individuals from engaging in prohibited behavior, three conditions must be met. First, individuals must have a fear of the potential penalty that they may face if caught. Second, there must be a reasonable probability of individuals being caught for their actions. Lastly, there must be a reasonable probability that the penalty will actually be administered if someone is caught. If these three conditions are met, then laws and policies can effectively act as deterrents. Therefore, the statement is true.
2.
What is/are the general cause(s) of unethical and illegal behavior?
Correct Answer
D. All of the above
Explanation
Unethical and illegal behavior can be caused by accidents, where individuals may unknowingly engage in such behavior without intending to do so. It can also be caused by intent, where individuals purposely choose to engage in unethical or illegal actions. Additionally, unethical and illegal behavior can result from ignorance, where individuals may not be aware that their actions are unethical or illegal. Therefore, all of the above factors can contribute to the occurrence of unethical and illegal behavior.
3.
The Association of Computing Machinery focuses on the ethics of security professionals.
Correct Answer
A. True
Explanation
The Association of Computing Machinery (ACM) is a professional organization that is dedicated to advancing computing as a science and profession. One of the areas that ACM focuses on is the ethics of security professionals. This means that ACM provides resources, guidelines, and standards for security professionals to ensure that they adhere to ethical principles while performing their duties. Therefore, the statement "The Association of Computing Machinery focuses on the ethics of security professionals" is true.
4.
_______________________ in an organization that began as a cooperative effort between the FBI’s Cleveland Field Office and local technology professionals.
Correct Answer
A. National InfraGard Program
Explanation
The National InfraGard Program is the correct answer because it is specifically mentioned in the question as the organization that began as a cooperative effort between the FBI's Cleveland Field Office and local technology professionals. The other options, National Security Agency and Department of Homeland Security, are not mentioned in the question and therefore are not the correct answer.
5.
Along with providing protective services for key members of the U.S. government, the Secret Service is also charged with the detection and arrest of any person committing a U. S. federal offense relating to computer fraud and false identification crimes.
Correct Answer
A. True
Explanation
The United States Secret Service is indeed tasked with both the protection of government officials and the investigation of financial crimes, which can include computer fraud and false identification crimes. The Secret Service was originally created to combat counterfeit currency, and their role has expanded over time to include other financial crimes and the protection of government officials.
6.
_____________________ is the process of identifying vulnerabilities in an organization’s information systems and taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of all the components.
Correct Answer
B. Risk management
Explanation
Risk management is the correct answer because it involves the process of identifying vulnerabilities in an organization's information systems and taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of all the components. It encompasses the identification, assessment, and prioritization of risks, as well as the implementation of strategies to mitigate or manage those risks. Risk management aims to minimize potential threats and maximize opportunities, ensuring the overall security and stability of an organization's information systems.
7.
_________________________ is the process of applying controls to reduce the risks to an organization’s data and information systems.
Correct Answer
C. Risk control
Explanation
Risk control is the process of applying controls to reduce the risks to an organization's data and information systems. This involves implementing measures and procedures to mitigate the identified risks and protect the organization's assets. By implementing controls such as access controls, encryption, backup systems, and disaster recovery plans, the organization can minimize the likelihood and impact of potential risks. Risk control is an essential component of risk management, which encompasses the identification, assessment, and mitigation of risks to ensure the security and integrity of an organization's data and information systems.
8.
The categories of law that affect the individual in the workplace are private law and public law.
Correct Answer
A. True
Explanation
Private law and public law are two broad categories of law that have an impact on individuals in the workplace. Private law deals with the legal relationships between individuals, such as employment contracts and disputes, while public law governs the relationship between individuals and the state, including labor laws and regulations. Therefore, it is true that these two categories of law affect the individual in the workplace.
9.
Civil law addresses violations harmful to society and is actively enforced by the state.
Correct Answer
B. False
Explanation
Civil law addresses violations harmful to society and is actively enforced by the state. This statement is incorrect. Civil law deals with disputes between individuals or organizations, such as contract disputes or property disputes, rather than violations harmful to society. It is not actively enforced by the state, but rather relies on individuals or organizations filing lawsuits to seek resolution. Criminal law, on the other hand, addresses violations that are harmful to society and is actively enforced by the state.
10.
In an organization, it is the responsibility of each community of interest to manage the risks that an organization encounters.
Correct Answer
A. True
Explanation
Each community of interest within an organization plays a crucial role in managing the risks that the organization faces. This means that it is not solely the responsibility of a specific department or individual, but rather a collective effort. By involving all stakeholders and communities of interest, the organization can effectively identify, assess, and mitigate risks. This approach promotes a proactive and comprehensive risk management strategy, ensuring that all aspects of the organization are considered and protected.