Exam 24: Legal Issues and Ethics
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Which law makes it illegal to develop,produce,and trade any device or mechanism designed to circumvent technological controls used in copy protection?
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
B
What is the law that overhauled the financial accounting standards for publicly traded firms in the United States?
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
D
What are the laws that govern computer access and trespass?
Free
(Essay)
4.7/5
(38)
Correct Answer:
Gaining unauthorized access,by whatever means,including using someone else's credentials,is computer trespass.Exceeding granted authority is also computer trespass.Many nations have versions of computer trespass or misuse statutes,although the terminology varies greatly among countries.
_______________ is a set of contractual rules governing how credit card data is to be protected.
(Short Answer)
4.9/5
(41)
The _______________ was designed to establish criminal provisions for access to stored electronic records and communications.
(Short Answer)
4.9/5
(34)
The Wassenaar Arrangement can be described as which of the following?
(Multiple Choice)
4.9/5
(33)
The _______________ is an international agreement between countries concerning the import/export of cryptographic software,and has enabled mass-marketed products to generally flow across borders.
(Short Answer)
4.8/5
(39)
The law that regulates unsolicited commercial e-mail is the
(Multiple Choice)
4.8/5
(32)
What is a law passed by a legislative branch of government called?
(Multiple Choice)
4.8/5
(28)
The DMCA protects the rights of recording artists and the music industry.
(True/False)
4.8/5
(26)
Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce,or to use a computer in a crime that is interstate in nature?
(Multiple Choice)
4.9/5
(34)
_______________ technology is used to protect digital rights management and prevent unauthorized use.
(Short Answer)
4.9/5
(31)
Falsifying header information is not covered by the CAN-SPAM Act.
(True/False)
4.8/5
(35)
_______________ allows unsolicited commercial e-mail as long as it adheres to three rules of compliance: unsubscribe,content,and sending behavior compliance.
(Short Answer)
4.9/5
(36)
The CAN-SPAM Act allows unsolicited e-mail as long as there is an unsubscribe link;the content must not be deceptive and not harvest emails.
(True/False)
4.9/5
(39)
What do you call a law based on previous events or precedents?
(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)