Exam 10: Legal, Regulations, Investigations, and Compliance

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The Electronic Communications Privacy Act (ECPA) of 1986 affects law enforcement and intelligence agencies.

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

True

PII is any piece of data that can be used alone or with other information to identify a single person.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

The purpose of the USA PATRIOT Act of 2001 is to enhance the investigatory tools that law enforcement can use, including e-mail communications, telephone records, Internet communications, medical records, and financial records.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

Which term is all about gathering information?

(Multiple Choice)
4.7/5
(41)

What is another word for shareware?

(Multiple Choice)
4.7/5
(23)

Which type of law reflects on the morals of the people and relies heavily on precedence?

(Multiple Choice)
4.9/5
(45)

What is the second step of the incident response procedure?

(Multiple Choice)
4.8/5
(29)

Which of the following is NOT part of the EU Principles on Privacy?

(Multiple Choice)
4.7/5
(37)

A safe harbor is a country that fails to legally protect personal data with the main aim being to attract companies engaged in the collection of the data.

(True/False)
4.8/5
(33)

When investigating a computer crime, evidentiary rules do not need to be addressed.

(True/False)
4.7/5
(31)

Civil/tort law is a group of laws that recognizes exclusive rights for creations of the mind.

(True/False)
4.9/5
(36)

Due care and due diligence are independent of each other.

(True/False)
4.7/5
(32)

What is the first step in the order of volatility?

(Multiple Choice)
4.8/5
(33)

Which law affects any organization that is publicly traded in the United States?

(Multiple Choice)
4.9/5
(44)

Which intellectual property right is granted to an individual or company to cover an invention C described in the application?

(Multiple Choice)
4.8/5
(37)

Software piracy is an example of computer prevalence crime.

(True/False)
4.8/5
(33)

Most organizations that have trademarks attempt to protect these secrets using nondisclosure agreements (NDAs).

(True/False)
4.8/5
(30)

When criminals use computers to help them steal confidential organizational data, a computer-assisted crime has occurred.

(True/False)
4.8/5
(45)

Which computer crime occurs when a computer is involved in a computer crime without being the victim of the attack or the attacker?

(Multiple Choice)
5.0/5
(36)

Which act affects how private sector organizations collect, use, and disclose personal information in the course of commercial business in Canada?

(Multiple Choice)
4.7/5
(45)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)