Exam 10: Legal, Regulations, Investigations, and Compliance
Exam 1: The Cissp Exam10 Questions
Exam 2: Access Control20 Questions
Exam 3: Telecommunications and Network Security19 Questions
Exam 4: Information Security Governance and Risk Management20 Questions
Exam 5: Software Development Security20 Questions
Exam 6: Cryptography20 Questions
Exam 7: Security Architecture and Design20 Questions
Exam 8: Operations Security19 Questions
Exam 9: Business Continuity and Disaster Recovery20 Questions
Exam 10: Legal, Regulations, Investigations, and Compliance20 Questions
Exam 11: Physical Environmental Security20 Questions
Select questions type
The Electronic Communications Privacy Act (ECPA) of 1986 affects law enforcement and intelligence agencies.
Free
(True/False)
4.7/5
(34)
Correct Answer:
True
PII is any piece of data that can be used alone or with other information to identify a single person.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
The purpose of the USA PATRIOT Act of 2001 is to enhance the investigatory tools that law enforcement can use, including e-mail communications, telephone records, Internet communications, medical records, and financial records.
Free
(True/False)
4.9/5
(41)
Correct Answer:
True
Which type of law reflects on the morals of the people and relies heavily on precedence?
(Multiple Choice)
4.9/5
(45)
Which of the following is NOT part of the EU Principles on Privacy?
(Multiple Choice)
4.7/5
(37)
A safe harbor is a country that fails to legally protect personal data with the main aim being to attract companies engaged in the collection of the data.
(True/False)
4.8/5
(33)
When investigating a computer crime, evidentiary rules do not need to be addressed.
(True/False)
4.7/5
(31)
Civil/tort law is a group of laws that recognizes exclusive rights for creations of the mind.
(True/False)
4.9/5
(36)
Which law affects any organization that is publicly traded in the United States?
(Multiple Choice)
4.9/5
(44)
Which intellectual property right is granted to an individual or company to cover an invention C described in the application?
(Multiple Choice)
4.8/5
(37)
Most organizations that have trademarks attempt to protect these secrets using nondisclosure agreements (NDAs).
(True/False)
4.8/5
(30)
When criminals use computers to help them steal confidential organizational data, a computer-assisted crime has occurred.
(True/False)
4.8/5
(45)
Which computer crime occurs when a computer is involved in a computer crime without being the victim of the attack or the attacker?
(Multiple Choice)
5.0/5
(36)
Which act affects how private sector organizations collect, use, and disclose personal information in the course of commercial business in Canada?
(Multiple Choice)
4.7/5
(45)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)