Exam 27: Cyberlaw

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Computer Fraud and Abuse Act prohibits all but which of the following?

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

B

"Hacking" is:

Free
(Multiple Choice)
4.7/5
(45)
Correct Answer:
Verified

D

Rob works for a federal governmental agency.No policy statements have been reported to the employees regarding their privacy rights or regarding their use of workplace computers for personal business.Rob's supervisor has reason to suspect that Rob has used his workplace computer to order an illegal substance.Which of the following is true?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

D

The case of Carafano v.Metrosplash.com,Inc.held:

(Multiple Choice)
4.9/5
(38)

Explain the difference between an ISP and a Web host,and discuss whether they are treated alike under the Communications Decency Act (CDA).

(Essay)
4.8/5
(33)

The Children's Online Privacy Protection Act:

(Multiple Choice)
4.8/5
(33)

You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys.The next time you log on,your screen has a banner ad for Dallas Cowboy hats and shirts.This banner ad is most likely the result of:

(Multiple Choice)
4.9/5
(30)

Jorgeson Co.,on its website,promised the company would not give PII to third parties without the customer's consent,but then gave out such information.This practice violates Section 5 of the FTC Act.

(True/False)
4.8/5
(38)

Under the ECPA any intended recipient has the right to disclose the content of an email

(True/False)
4.8/5
(39)

After Ashley was denied credit for a new car,she checked her credit report with Equifax.The report showed that several credit cards had been issued to her recently,and they had large,unpaid balances.Ashley had not applied for or received these cards.She found out that someone had stolen personal information she had entered onto her computer and used the information to fraudulently obtain the credit cards.Ashley:

(Multiple Choice)
4.9/5
(29)

Tom receives an e-mail from someone alleging to be a Nigerian government official who has stolen money from the government.He needs some place safe to keep the money for a short time.The official promises that,if Tom lets his bank account be used for this purpose,Tom will be allowed to keep a percentage of the stolen money.Tom gives in to the temptation and provides his account information.Instead of receiving money,Tom loses everything he had in the account to the scammer.In this situation:

(Multiple Choice)
4.9/5
(28)

Lois receives an e-mail asking her to update her personal information on a website that is an illegal imitation of a legitimate site.This practice:

(Multiple Choice)
4.8/5
(33)

Which of the following protects e-mail messages from unauthorized interception?

(Multiple Choice)
5.0/5
(44)

The CAN-SPAM Act:

(Multiple Choice)
4.8/5
(24)

What statute prohibits accessing a computer without authorization and obtaining information from it.?

(Multiple Choice)
4.9/5
(35)

Can-Spam is a federal statute that:

(Multiple Choice)
4.8/5
(32)

The Children's Online Privacy Protection Act prohibits Internet operators from collecting information from children under what age without parental permission?

(Multiple Choice)
4.9/5
(39)

Under the Electronic Communications Privacy Act:

(Multiple Choice)
4.8/5
(46)

Stuart is vying for a promotion,but faces competition from a co-worker,Brenda.Without authorization,Stuart accesses stored company records and discovers an unfavorable e-mail message Brenda had written about the company.Stuart sends the message to his supervisor in hopes of keeping Brenda from getting the promotion.Discuss whether Stuart has violated any statute and,if so,what sanctions he may face.

(Essay)
4.9/5
(36)

Unsolicited commercial e-mail (UCE)or unsolicited bulk e-mail (UBE)messages:

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 43
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)