Exam 12: Law and Ethics
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
Describe the 5 stage methodology an organization should follow in an investigation.
Free
(Essay)
4.9/5
(33)
Correct Answer:
In digital forensics,all investigations follow the same basic methodology:
1.Identify relevant items of evidentiary value (EM)
2.Acquire (seize)the evidence without alteration or damage
3.Take steps to assure that the evidence is at every step verifiably authentic at every step and is unchanged from the time it was seized
4.Analyze the data without risking modification or unauthorized access
5.Report the findings to the proper authority
Which of the following organizations does not promote a particular code of ethics?
Free
(Multiple Choice)
4.7/5
(43)
Correct Answer:
D
Evidentiary ____________________,also known as items of potential evidentiary value,is any information that could potentially support the organization's legal- or policy-based case against a suspect.
Free
(Short Answer)
4.9/5
(26)
Correct Answer:
material
In 1996,HIPAA was enacted to protect the confidentiality and security of business data.
(True/False)
4.8/5
(44)
The ____ is a professional organization that was established in 1947 as the world's first educational and scientific computing society.
(Multiple Choice)
4.7/5
(26)
Laws are largely drawn from the ____ of a culture,which in turn are based on ____ - fixed moral attitudes of a societal group.
(Multiple Choice)
4.9/5
(36)
____ is not absolute freedom from observation,but rather the state of being free from unsanctioned intrusion.
(Multiple Choice)
4.9/5
(31)
U.S.copyright law extends protection to _________________________ which includes words published in electronic formats.
(Short Answer)
4.8/5
(32)
Due diligence requires that an organization make a valid and ongoing effort to protect others._________________________
(True/False)
4.7/5
(44)
Founded in 1989,____ has a membership of over 156,000 security professionals,auditors,system administrators,and network administrators.
(Multiple Choice)
4.7/5
(37)
Historically,the United Kingdom has led the development and implementation of information security legislation to prevent misuse and exploitation of information and information technology.
(True/False)
4.8/5
(40)
____ requires that an organization make a valid and ongoing effort to protect others.
(Multiple Choice)
4.9/5
(40)
The origins of ____________________ rights can be traced back to a 1772 document titled The Rights of the Colonists and a List of Infringements and Violations of Rights written by Samuel Adams.
(Short Answer)
4.9/5
(28)
In digital forensics,all investigations follow the same basic methodology.Which of the following should be performed FIRST in a digital forensics investigation?
(Multiple Choice)
5.0/5
(36)
____ is the best method for preventing an illegal or unethical activity.Examples include laws,policies and technical controls.
(Multiple Choice)
4.8/5
(34)
____________________ law covers a wide variety of laws pertaining to relationships between and among individuals and organizations.
(Short Answer)
4.9/5
(36)
The privacy standards of HIPAA severely restrict the dissemination and distribution of private health information without written consent.
(True/False)
4.8/5
(40)
____ is the cornerstone of many computer-related federal laws and enforcement efforts.
(Multiple Choice)
4.8/5
(34)
____ law embodies a wide variety of laws pertaining to relationships between and among individuals and organizations.
(Multiple Choice)
4.8/5
(35)
The ACM requires its members to perform their duties in a manner befitting an ethical computing professional._________________________
(True/False)
4.8/5
(29)
Showing 1 - 20 of 113
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)