Exam 24: Legal Issues and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which law makes it illegal to develop,produce,and trade any device or mechanism designed to circumvent technological controls used in copy protection?

Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
Verified

B

What is the law that overhauled the financial accounting standards for publicly traded firms in the United States?

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

D

What are the laws that govern computer access and trespass?

Free
(Essay)
4.7/5
(38)
Correct Answer:
Verified

Gaining unauthorized access,by whatever means,including using someone else's credentials,is computer trespass.Exceeding granted authority is also computer trespass.Many nations have versions of computer trespass or misuse statutes,although the terminology varies greatly among countries.

The Electronic Communications Privacy Act (ECPA)of 1986

(Multiple Choice)
4.9/5
(38)

_______________ is a set of contractual rules governing how credit card data is to be protected.

(Short Answer)
4.9/5
(41)

The _______________ was designed to establish criminal provisions for access to stored electronic records and communications.

(Short Answer)
4.9/5
(34)

The Wassenaar Arrangement can be described as which of the following?

(Multiple Choice)
4.9/5
(33)

What is the Convention on Cybercrime?

(Multiple Choice)
4.8/5
(31)

The _______________ is an international agreement between countries concerning the import/export of cryptographic software,and has enabled mass-marketed products to generally flow across borders.

(Short Answer)
4.8/5
(39)

Computer trespass is treated as a crime in many countries.

(True/False)
4.9/5
(39)

The law that regulates unsolicited commercial e-mail is the

(Multiple Choice)
4.8/5
(32)

What is a law passed by a legislative branch of government called?

(Multiple Choice)
4.8/5
(28)

The DMCA protects the rights of recording artists and the music industry.

(True/False)
4.8/5
(26)

Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce,or to use a computer in a crime that is interstate in nature?

(Multiple Choice)
4.9/5
(34)

_______________ technology is used to protect digital rights management and prevent unauthorized use.

(Short Answer)
4.9/5
(31)

Falsifying header information is not covered by the CAN-SPAM Act.

(True/False)
4.8/5
(35)

_______________ allows unsolicited commercial e-mail as long as it adheres to three rules of compliance: unsubscribe,content,and sending behavior compliance.

(Short Answer)
4.9/5
(36)

The CAN-SPAM Act allows unsolicited e-mail as long as there is an unsubscribe link;the content must not be deceptive and not harvest emails.

(True/False)
4.9/5
(39)

The sale of some types of encryption overseas is illegal.

(True/False)
4.8/5
(32)

What do you call a law based on previous events or precedents?

(Multiple Choice)
4.9/5
(40)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)