Central Washington University Science Questions

Question 10 / 2 points

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Which of these laws sets standards for collective bargaining?

Question options:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The Occupational Safety and Health Act (OSHA)

The National Labor Relations Act (NLRA)

The Fair Credit Reporting Act (FCRA)

The

Fair Labor Standards Act

(FLSA)

View FeedbackQuestion 22 / 2 points

Defamation can be claimed if an employer

Question options:

Reading a private email sent by an employee to an outside individual.

Discloses correct and relevant information about an employee while giving a reference.

Conducts surveillance in employee restrooms and break rooms to track abuse of the facilities.

Discloses factually incorrect information when providing a reference for an employee.

View FeedbackQuestion 32 / 2 points

The employer-employee relationship is governed primarily by what type of law?

Question options:

Contract Law

Criminal Law

Administrative Law

Common Law

View FeedbackQuestion 42 / 2 points

Which federal organizations oversee telemarketing?

Question options:

FTC

and DoT

FTC and

OMB

FTC and

FCC

FCC and OMB

View FeedbackQuestion 52 / 2 points

Which of the following is an example of the FTC’s Telemarketing Sales Rule (

TSR

)?

Question options:

Customer Proprietary Network Information (CPNI)

Junk Fax Prevention Act

The U.S. National DNC Registry

Controlling the Assault of Non-Solicited Pornography and Marketing (

CAN-SPAM

) Act

View FeedbackQuestion 62 / 2 points

What entity primarily enforces the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003?

Question options:OMBFTC

DOT

FCCView FeedbackQuestion 70 / 2 points

Which of the following are examples of

IoT

devices?

Question options:

Tablets and Smart Thermostats

Connected Cars and Smart Cities

Wearables and Computers

Smartphones and Smart Homes

View FeedbackQuestion 82 / 2 points

What technology principle, commonly referred to as a “law” is understood to say that computing power doubles every 18 months?

Question options:

Fair Information Privacy Practices

Asimov’s Law of Robotics

Law of

Big Data

Moore’s Law

View FeedbackQuestion 92 / 2 points

Which of the following CISA provisions state “Sharing information with federal government does not waive privilege”?

Question options:

A company is authorized to monitor and operate defensive measures on its own information system or, with written authorization, another party’s system for cybersecurity purposes.

A company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and that the company is aware at the time relates to a specific individual.

Does not waive privileges, such as attorney-client privilege. Importantly, there is no similar provision for sharing with state and local governments or other companies.

A company is authorized to share with the federal government, state and local governments, and other companies and private entities cyber threat indicators and defensive measures for a cybersecurity purpose or to receive such information from these entities.

View FeedbackQuestion 100 / 2 points

What privacy related information is OSHA required by law to disclose?

Question options:

Routinely required to produce emails, documents and other company records containing substantial personal information.

Compilation and reporting of information about certain workplace injuries and illnesses.

Serious adverse events, product problems or medication errors suspected to be associated with the use of regulated drug, biologic, device or dietary supplement.

Protected health information.

View FeedbackQuestion 110 / 2 points

Which law has been important to the last century of Fourth Amendment jurisprudence?

Question options:

Telephone Wiretap Law

Communications Assistance to Law Enforcement Act

Stored Communications Act

Electronic Communications Privacy Act

View FeedbackQuestion 120 / 4 points

There are three emerging areas associated with technologies to monitor employees. Which of the following is one of those emerging areas?

Question options:

How companies ban the use of social media.

How companies implement technology loss prevention programs.

How companies cope with BYOD.

How companies cope with employee misconduct.

View FeedbackQuestion 130 / 4 points

HIPAA, COBRA, ERISA, and FLMA are examples of what?

Question options:

Laws Protecting Employee Privacy

Laws Establishing Fair Pay

Laws Regulating Employee Background Checks

Laws Regulating Workplace Safety

View FeedbackQuestion 140 / 4 points

These two statements are reasons for what? 1) Limit liability for unlicensed transmission of copyrighted material and other confidential company information and 2) Protect trade secrets

Question options:

BYOD Monitoring

Monitoring in the Workplace

Social Media Monitoring

Lifestyle Monitoring

View FeedbackQuestion 150 / 4 points

E-discovery implicates both domestic privacy concerns and issues arising in transborder data flows. Electronically stored information (ESI) takes not only obvious forms such as email or word processing documents, but can also manifest itself as databases, web pages, server logs, instant messaging transcripts, voicemail systems, social networking records, thumb drives or even the microSD cards found in smartphones. Managing e-discovery and privacy begins with a well-managed what?

Question options:

Cyber threat indicators.

Transborder data flows.

Database Design.

Data retention program.

View FeedbackQuestion 160 / 4 points

The

Cybersecurity Information Sharing Act

(CISA) became law in 2015. The statute permits the federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out. Which CISA provisions is this statement? “For sharing to qualify for protections under CISA, the company’s actions must be done in accordance with certain requirements. For example, a company intending to share a cyber threat indicator must first remove, or implement a technical capacity configured to remove, any information that is not directly related to a threat and relates to a specific individual.”

Question options:

Authorization for a company to share or receive cyber threat indicators or defensive measures.

Sharing information with federal government does not waive privileges.

Prohibition on government using shared information to regulate or take enforcement actions against lawful activities.

Requirement for company to remove personal information before sharing.

View FeedbackQuestion 174 / 4 points

Which of the following provides an extra layer of protection for members of the media and media organizations from government searches or seizures in the course of a criminal investigation?

Question options:Communications Assistance to Law Enforcement ActCybersecurity Information Sharing ActElectronic Communications Privacy Act

Privacy Protection Act

View FeedbackQuestion 180 / 4 points

The threat from IoT is not so much that an individual device will be compromised, but that IoT will allow an avenue for attack of a network. IoT devices should follow security and encryption best practices and IoT devices should communicate with restrictive rather than permissive protocols best practices recommended by what organization?

Question options:FCCFTC

BITAG

NHTSA

View FeedbackQuestion 190 / 4 points

In the early 1980s, individuals dealt with desktop computers. Later, people adapted to laptops and eventually smartphones. What represents a new development in the ways that individuals interact with computing devices?

Question options:

AI

Robots

Big DataIoTView FeedbackQuestion 204 / 4 points

There are many challenges related to wearable’s data that focus on users’ privacy concerns. One concern is lack of control of the data collected by wearables. Which of the following best describes this concern?

Question options:

Users are concerned that tracking data daily will make it difficult for them to get rid of documentation of actions that they would rather forget.

Users are concerned that government and organizations may use the data without their consent or knowledge.

Users are concerned that some devices sync instantaneously with social media, without providing an effective opportunity to restrict such sharing.

Users pointed out that many devices, such as smart watches, have a display that can be read by those who are near the user.

View FeedbackQuestion 210 / 4 points

Which of the following applies to anyone who advertises products or services by electronic mail directed to or originating from the United States. It also covers the transmission of commercial email messages whose primary purpose is advertising or promoting a product or service.

Question options:CAN-SPAMTSR

JFPA

TCPA

View FeedbackQuestion 224 / 4 points

The Video Privacy Protection Act of 1988 (VPPA) was passed in response to the disclosure and publication of then-Supreme Court nominee Robert Bork’s video rental records. The act applies to video tape service providers. Videotape service providers are prohibited from disclosing customer PII unless an enumerated exception applies. Which of the following is an enumerated exception?

Question options:

The disclosed PII includes only names, addresses, and subject matter descriptions.

The disclosed PII includes only the names and addresses of consumers.

The disclosed PII is made to law enforcement.

The disclosed PII is released to a family member.

View FeedbackQuestion 230 / 4 points

This statement is an example of what rule governing telemarketing calls? “If a consumer tells one division of a company not to call again, a distinct corporate division of the same company may still make calls to that consumer. If the divisions are not distinct, however, the seller may not call the consumer even to offer different goods or services.”

Question options:

Transmission of Caller ID Information

Misrepresentations and Material Omissions

Required Disclosures

Entity-Specific Suppression Lists

View FeedbackQuestion 246 / 6 points

When Red Clay performs renovations because of a medical condition or disability, the company works with health insurance companies, Medicare/Medicaid, and medical doctors to plan appropriate modifications to the home and to obtain reimbursement from insurers. This sometimes requires Red Clay to receive, process, store, and transmit Protected Health Information (PHI) generated by medical practitioners or as provided by the customer. Red Clay received a request to share the collect PHI as part of a state-wide research project into smart homes? Why can Red Clay not release this information?

Question options:

Attorney-Client Privilege

The Privacy Rule

Freedom of Information Act (FOIA)

Electronic Communication Privacy Act

View FeedbackQuestion 250 / 6 points

Red Clay’s Customer relations and Marketing departments use big data analytics applications when analyzing company data for decision making. The employees doing data analytics often have no need to see the customers’ names and full account numbers. Identifiers are not needed for many Big Data applications, so the benefits of analytics can be achieved while reducing the privacy and security risks. This is an example of which Fair Information Privacy Practice?

Question options:

Data Minimization

Collection Limitation

Use Limitation

De-identification

View FeedbackQuestion 260 / 6 points

Red Clay Renovations has uncovered an insider theft that resulted in the unauthorized disclosure of personal information about the company’s executives and senior managers that was stored in digital form in the personnel office. Outrage has ensued in the executive offices especially since the stolen and leaked information included health conditions that were on file in the company’s personnel records as part of the “in case of emergency” register. Red Clay’s CEO has decided that the company will hire a professional polygraph firm to interview all employees who had access to the data center servers where the files were stored. Which of the following laws or regulations provides guidance for the use of polygraphs in the planned employee interviews?

Question options:

Employee Polygraph Protection Act of 1988

HIPAA Security Rule

Fair Labor Standards Act

Whistleblower Protection Act

View FeedbackQuestion 270 / 6 points

Red Clay uses digital advertising, which is composed of desktop/laptop and mobile advertising, as an integral part of their marketing strategy. To avoid FTC and state attorney general enforcement actions, Red Clay voluntarily agreed to be bound by self-regulatory principles. Which of the following principles includes an important feature allowing consumers to opt-out?

Question options:

Broadband Privacy Rule

The U.S. National Do Not Call Registry

Digital Advertising Alliance

Network Advertising Initiative

View FeedbackQuestion 280 / 6 points

Red Clay Renovations needs to update its privacy policies to ensure that it is not violating federal laws about telemarketing. The team is working on the section of policy which covers when the company is allowed to use telephone calls to contact consumers. Which of the following are allowed exceptions to the Do Not Call registry?

Question options:

The consumer’s phone number was obtained using a sweepstakes entry.

The consumer’s email address and phone number were obtained from a Facebook page.

The company has an existing business relationship with the consumer.

The consumer made an inquiry about the company’s products within the past 24 months.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER