During an investigation into a bank robbery, the Federal Bureau of Investigation (FBI) wants to monitor the telephone calls of identified suspects in the case for a two-week period. Due to the short time frame of the investigation, the FBI does not have time to pursue judicial authorization and get a warrant for surveillance.
Which type of telephone calls is legal for the FBI to monitor under the Foreign Intelligence Surveillance Act (FlSA). given the time frame of the investigation?
A malicious hacker takes over several computers via the internet and causes them to flood a target site with high volumes of data queries and other small tasks. Which type of attack is the hacker performing against the target site?
An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.
Which doctrine covers the company's employment and reproduction of these materials?
A company is bidding on a website project for a prospective client. The company knows that the client is going to weigh the time to deliver the project as one of its primary decision factors. The client has advised all bidders that completion time should be no more than three months with a budget of S50.000.
The company knows that with its current resourcing, it cannot complete the project in less than four months. However, it is confident that it will be able to deliver within four months to a high-quality standard and 20% under the set budget. The company advises the client that it would need four months but would be able to complete the project under budget.
What is this behavior considered?
A customer places an order for a product on an e*commerce site after reviewing the quantity and pricing on the online form. The customer then receives an email confirmation that displays different pricing than the order form. The customer reports the discrepancy to customer service.
Which security practice is this customer addressing?
Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?
To gather data for improved customer profiles, a social media platform uses microphone data from its users in the United States. Which U.S. Constitulional amendment does this action violate?
An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.
What should this engineer do?
An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?
A software company continues to refine and update the predictive algorithm that makes its product the market leader. Although the company announces some changes, most are unannounced so that people and businesses remain unaware.
What is this company protecting?
A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.
Which ethical theory does this approach represent?
A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.
Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?
A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.
Which name describes this specialist?
A cloud computing company uses machine learning software to screen the resumes of job seekers. The company's aim is to reduce potential human prejudice in the hiring process. To set up the software and train the machine learning model, the company provides information from its hiring decisions over the past five years. After several months of using the software, the company runs an audit and finds that the software screens out minority job seekers at a much higher rate.
Which behavior is the trained machine learning model displaying?
A publicly-traded organization listed on the New York Stock Exchange has been flagged for possible accounting malpractices. An auditor discovers that the company used funds to disguise payments to international officials. The auditor also finds that the system of internal control does not adequately maintain books and records that reflect all business transactions.
Which law did the organization potentially violate?