2026 QUESTIONS WITH SOLUTIONS
GRADED A+
◍ risk.
Answer: The potential of gaining or losing something of value. Risk can be
quantified by three elements: a risk event, the probability of the event
happening, and the impact (positive or negative) on the business outcome if
the risk does actually occur.
◍ software piracy.
Answer: A form of copyright infringement that involves making copies of
software or enabling others to access software to which they are not entitled.
◍ botnet.
Answer: A large group of computers, which are controlled from one or more
remote locations by hackers, without the knowledge or consent of their
owners.
◍ Uniform Trade Secrets Act (UTSA).
Answer: An act drafted in the 1970s to bring uniformity to all the United
States in the area of trade secret law.
◍ exploit.
Answer: An attack on an information system that takes advantage of a
particular system vulnerability.
◍ Foreign Intelligence Surveillance Act (FISA).
Answer: Describes procedures for the electronic surveillance and collection
of foreign intelligence information in communication between foreign
powers and the agents of foreign powers.
,◍ Processes.
Answer: a collection of steps designed to direct the most important tasks of
an organization
◍ Communication.
Answer: The process of using symbols to exchange meaning
◍ trademark.
Answer: A logo, package design, phrase, sound, or word that enables a
consumer to differentiate one company's products from another's.
◍ firewall.
Answer: Hardware or software (or a combination of both) that serves as the
first line of defense between an organization's network and the Internet; a
firewall also limits access to the company's network based on the
organization's Internet-usage policy.
◍ reasonable assurance.
Answer: A concept in computer security that recognizes that managers must
use their judgment to ensure that the cost of control does not exceed the
system's benefits or the risks involved.
◍ Foreign Intelligence Surveillance Amendments Act of 2008.
Answer: An act that granted NSA expanded authority to collect, without
courtapproved warrants, international communications as they flow through
U.S. telecommunications network equipment and facilities.
◍ virtue.
Answer: A habit that inclines people to do what is acceptable.
◍ intrapersonal communication.
Answer: self-talk, when you have an internal dialog with yourself
◍ The following list shows some of the actions that schools can take to combat
student plagiarism:.
Answer: Help students understand what constitutes plagiarism and why they
need to cite sources properly.Show students how to document web pages
, and materials from online databases.Schedule major writing assignments so
that portions are due over the course of the term, thus reducing the
likelihood that students will get into a time crunch and be tempted to
plagiarize to meet the deadline.Make clear to students that instructors are
aware of Internet paper mills.Ensure that instructors both educate students
about plagiarism detection services and make them aware that they know
how to use these services.Incorporate detection software and services into a
comprehensive antiplagiarism program.
◍ next-generation firewall (NGFW).
Answer: A hardware- or software-based network security system that is able
to detect and block sophisticated attacks by filtering network traffic
dependent on the packet contents.
◍ copyright infringement.
Answer: A violation of the rights secured by the owner of a copyright;
occurs when someone copies a substantial and material part of another's
copyrighted work without permission.
◍ risk management.
Answer: The process of identifying, monitoring, and limiting risks to a level
that an organization is willing to accept.
◍ store-and-forward telemedicine.
Answer: The acquiring of data, sound, images, and video from a patient and
then transmitting everything to a medical specialist for later evaluation.
◍ European Union Data Protection Directive.
Answer: A directive that requires any company doing business within the
borders of the countries comprising the European Union (EU) to implement
a set of privacy directives on the fair and appropriate use of information.
◍ ISO 9001 family of standards.
Answer: A set of standards written to serve as a guide to quality products,
services, and management. It provides a set of standardized requirements for
a quality management system.
, ◍ Demographic Traits.
Answer: Demographic traits refer to the characteristics that make someone
an individual, but that he or she has in common with others
◍ Vice.
Answer: immoral or wicked behavior
◍ résumé inflation.
Answer: Falsely claiming competence in a skill, usually because that skill is
in high demand.
◍ transference.
Answer: A risk management strategy in which the risk, should it happen,
does not rest solely on one individual or organization. For example, a
common way to accomplish risk transference is for an individual or an
organization to purchase insurance, such as auto or business liability
insurance. Another way to transfer risk is to outsource the risk by
contracting with a third party to manage the risk.
◍ distributed denial-of-service (DDoS) attack.
Answer: An attack in which a malicious hacker takes over computers via the
Internet and causes them to flood a target site with demands for data and
other small tasks.
◍ Capability Maturity Model Integration (CMMI) models.
Answer: Collection of best practices that help organizations improve their
processes.
◍A
U. S. company launched an e-commerce platform in the European Union
(EU). The board of directors raised concerns about compliance with
applicable privacy regulations and the collection of customer
information.Which regulation applies to this scenario?.
Answer: General Data Protection Regulation
◍ annualized loss expectancy (ALE).