need help with these cyber secuirty law questions: Questions 72 and 73 pertain t
ID: 3713838 • Letter: N
Question
need help with these cyber secuirty law questions:
Questions 72 and 73 pertain to the following fact pattern:
Pied Piper is a company that has recently been accused of violating its terms and conditions for
disclosure of user personal identifying information to third parties. The shareholders want to
hold the Board of Directors, including CEO Richard Hendricks, COO Jared Dunn, and Systems
Architect Bertram Gilfoyle, accountable.
72. Which type of lawsuit is the most appropriate recourse for the shareholders to achieve their
goal?
A. Consumer Class Action
B. Corporate Action
C. Collective Action
D. Derivative Action.
73. The Board of Directors at Pied Piper is convinced that the decisions leading to the alleged
violations of terms and conditions were made as sound, strategic business decisions. Which of
the following defenses is the Board’s best bet for defending the action identified in Question 72?
A. Business Judgment Rule
B. Strategic Vision Rule
C. More Profits Rule
D. Corporate Decisions Rule
74. The controversy between Titles 10 and 50 of the United States Code is basically a lack of
guidance between the roles and responsibilities of which two groups?
A. US military forces and US intelligence agencies
B. US elected officials and US intelligence agencies
C. US military forces and US elected officials
D. US military forces and US appointed officials
75. Which of the following is not a term used to describe a method of acquiring personal
identifying information through deceptive human engineering means?
A. Phishing
B. Ice Phishing
C. Spear-Phishing
D. Whaling
76. The Federal Trade Commission was originally established in 1915 to enforce which body of
law?
A. Employee Privacy
B. Antitrust
C. International Trade
D. Consumer Privacy
77. Which of the following is not a method of civil discovery available to litigants in the federal
court system?
A. Interrogatories
B. Requests for Production of Documents
C. Requests for Admission
D. Inquisitions
78. Under the Fair Credit Reporting Act, Consumer Reporting Agencies must follow reasonable
procedures to assure what type of accuracy within consumer reports?
A. Maximum Possible Accuracy
B. Optimal Accuracy
C. Complete Accuracy
D. Understandable Accuracy
79. In some revenge porn cases, victims have been able to successfully recover damages from
perpetrators and website operators through what type of claim?
A. Negligence
B. Copyright Infringement
C. Breach of Fiduciary Duty
D. Deceptive Trade Practice
80. The time has come to say fair’s fair, to pay the rent, to pay our share. The time has come, a
fact’s a fact, it’s belongs to them, so what should we do?
A. Let’s Stay on Track
B. Let’s Give it Back
C. Let’s Take a Crack
D. Let’s Grab a Pack
Explanation / Answer
First 4 as per chegg policy
Questions 72 and 73 pertain to the following fact pattern:
Pied Piper is a company that has recently been accused of violating its terms and conditions for
disclosure of user personal identifying information to third parties. The shareholders want to
hold the Board of Directors, including CEO Richard Hendricks, COO Jared Dunn, and Systems
Architect Bertram Gilfoyle, accountable.
72. Which type of lawsuit is the most appropriate recourse for the shareholders to achieve their
goal?
A. Consumer Class Action
B. Corporate Action
C. Collective Action
D. Derivative Action.
73. The Board of Directors at Pied Piper is convinced that the decisions leading to the alleged
violations of terms and conditions were made as sound, strategic business decisions. Which of
the following defenses is the Board’s best bet for defending the action identified in Question 72?
A. Business Judgment Rule
B. Strategic Vision Rule
C. More Profits Rule
D. Corporate Decisions Rule
74. The controversy between Titles 10 and 50 of the United States Code is basically a lack of
guidance between the roles and responsibilities of which two groups?
A. US military forces and US intelligence agencies
B. US elected officials and US intelligence agencies
C. US military forces and US elected officials
D. US military forces and US appointed officials
75. Which of the following is not a term used to describe a method of acquiring personal
identifying information through deceptive human engineering means?
A. Phishing
B. Ice Phishing
C. Spear-Phishing
D. Whaling
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.