Questions

advertisement
QUESTION DRILL LAW, INVESTIGATION & ETHICS 020504 - Questions
1. Which RFC contains the Internet Activity Board's "Ethics and the Internet"
documentation?
a. RFC 1918
b. RFC 1394
c. RFC 1024
d. RFC 1087
2 Which of the following is not defined as unethical and unacceptable activity by
Internet Activity Board's "Ethics and the Internet" documentation?
a. Soliciting for non-profit organization donations
b. Wasting resources (people, capacity, computer) through such actions
c. Destroying the integrity of computer-based information
d. Compromising the privacy of users
3 The theft of small amounts of information from many sources to compile or
infer data about something private or classified is known as?
a. Masquerading
b. The Salami technique
c. Data diddling
d. Espionage
4 Which of the following is not technically a crime according to the law?
a. espionage
b. fraud
c. piracy
d. resource waste
5 Which of the following defined the unauthorized possession of information
without the intent to profit from the information as a crime?
a. 1991 U.S. Federal Sentencing Guidelines
b. U.S. Computer Fraud and Abuse Act
c. U.S. Privacy Act 1974
d. U.S. National Information Infrastructure Protection Act 1996
6 Evidence should be all but which of the following in order to be used in court?
a. Reliable
b. Sufficient
c. Relevant
d. Permissible
Page 1
7 Which of the following is not an element or aspect of the ISC(2) code of
ethics?
a. CISSP certification holders are required by law to uphold the ISC(2) code
of ethics
b. CISSP certification holders should adhere to the highest ethical standards of
behavior
c. A condition of CISSP certification is adherence to the ISC(2) code of
ethics.
d. Protect society, the commonwealth, and the infrastructure
8 Violation of the ISC(2) code of ethics can result in?
a. Arrest
b. Revocation of certification
c. Financial penalties
d. Community service hours
9 Which of the following is not directly specified in the cannons of the ISC(2)
code of ethics?
a. Act honorably, honestly, justly, responsibly, and legally
b. Provide diligent and competent service to principals.
c. Don't write malicious code such as viruses
d. Advance and protect the profession
10 The crime of impersonation or spoofing is also known as?
a. Spamming
b. Data diddling
c. Masquerading
d. Social engineering
11 Unauthorized modification of data is known as?
a. The salami technique
b. Spoofing
c. Malicious code
d. Data diddling
12 TEMPEST is concerned with?
a. Emanation eavesdropping
b. Distributed Denial of Service attacks.
c. Password theft
d. Dumpster diving
13 The act of extracting information from discarded materials is known as?
a. Fraud
b. Dumpster diving
c. Information warfare
d. Superzapping
Page 2
14 Which of the following is not supported by the ISC2's CISSP code of ethics?
a. promote understanding of security
b. provide competent service
c. do not disclose confidential information from clients
d. report crimes to ISC2
15 Which of the following is not considered a violation of computer ethics?
a. working overtime on an IT project
b. browsing files on the file server
c. using proprietary software without compensation
d. employing another's intellectual property without acknowledgement
16 Which of the following is not defined as unacceptable and inappropriate but
the Internet Activities Board of Ethics and the Internet?
a. seeking to gain unauthorized access to resources
b. conducting commercial activities over the Internet
c. destroying the integrity of computer stored information
d. wasting resources
17 Which of the following is not a valid means to identify or label computer
evidence?
a. writing on printouts with permanent markers
b. recording serial numbers
c. writing a contents and ID tag file to a hard drive
d. photographing the contents displayed on the monitor
18 What type of evidence proves or disproves a specific act through oral
testimony based on information gathered through the witness's five senses?
a. Hearsay evidence
b. Circumstantial evidence
c. Secondary evidence
d. Direct evidence
19 Which of the following is not an element in the ISC2's code of ethics that all
CISSP candidates must adhere to?
a. conduct themselves with high standards of moral, ethical, and legal
behavior
b. do not commit any unlawful act
c. do not write malicious code
d. report all discovered unlawful activity
20 Which of the following is not a computer crime?
a. social engineering
b. surfing pornographic Web sites
c. password sniffing
d. spoofing IP addresses
Page 3
21 Which of the following is a crime against a computer?
a. intercepting wireless network communications
b. installing software that has not been properly purchased
c. causing a blackout of the local power grid by damaging a power station
d. testing an intrusion script against a competitor's Web site
22 Which of these computer crimes is not like the others?
a. spoofing
b. social engineering
c. masqurading
d. data diddling
23 Which of the following is not a true statement according to the Generally
Accepted Systems Security Principles (GASSP)?
a. computer security supports the mission of an organization
b. computer security should be cost effective
c. computer security is not restrained by society
d. computer security should be periodically reassessed
24 The U.S. Department of Health, Education, and Welfare Code of Fair
Information Practices requires which of the following?
a. people must be able to remove any information about themselves from
databases containing personal data
b. organizations maintaining personal data do not need to ensure that data isn't
misused
c. data stored about people must be timely
d. the existence of systems that maintain records of a personal nature cannot
remain secret
25 Which of the following is considered a crime committed using a computer?
a. illegally transferring money from one bank account to another over the
Internet
b. erasing a hard drive using a degaussing magnet
c. setting fire to a building
d. theft of a notebook from an airport security checkpoint
26 Which category of common law allows for punishments to include financial
penalties but not imprisonment for a conviction?
a. civil law
b. criminal law
c. administrative law
d. regulatory law
Page 4
27 Which form of law focuses on the violation of government laws focused on the
protection of the public?
a. civil law
b. criminal law
c. administrative law
d. regulatory law
28 What form of common law is also known as tort?
a. Administrative law
b. Criminal law
c. Civil law
d. Regulatory law
29 Which of the following is not a valid countermeasure against the interception
of radio frequency and other electromagnetic radiation signals by unauthorized
individuals?
a. sound dampening insulation
b. TEMPEST equipment
c. white noise generation
d. control zones
30 Which of the following is not considered a computer crime?
a. espionage
b. natural disasters
c. fraud
d. embezzlement
31 Which of the following is not one of the types of laws found in the United
States that can be used in a court of law?
a. statutory law
b. administrative law
c. Islamic law
d. common law
32 The code of federal regulations is also known as?
a. statutory law
b. common law
c. case digests
d. administrative law
33 Which of the following laws addresses confidentiality, integrity, and
availability for both data and systems and encourages other countries to adopt
the same framework?
a. U.S. Privacy Act of 1974
b. Paperwork Reduction Act of 1995
c. U.S. National Information Infrastructure Protection Act of 1996
d. Gramm Leach Bliley Act of 1999
Page 5
34 Which of the following requires Federal Agencies to assess the security of their
non-classified information systems, to provide a risk assessment, and to report
the security needs of its systems?
a. U.S. Privacy Act of 1974
b. U.S. Computer Fraud and Privacy Act of 1986
c. U.S. National Information Infrastructure Protection Act of 1996
d. Paperwork Reduction Act of 1995
35 Which of the following defines the trafficking in computer passwords as a
federal crime if that activity affects interstate or foreign commerce or permits
unauthorized access to government computers?
a. U.S. Computer Fraud and Abuse Act of 1986
b. Paperwork Reduction Act of 1995
c. U.S. National Information Infrastructure Protection Act of 1996
d. Gramm Leach Bliley Act of 1999
36 Which of the following is an amendment to the U.S. Computer Fraud and
Privacy Act of 1986?
a. U.S. Privacy Act of 1974
b. U.S. National Information Infrastructure Protection Act of 1996
c. Paperwork Reduction Act of 1995
d. Gramm Leach Bliley Act of 1999
37 Which of the following laws requires that banks give customers the option to
prohibit the distribution of personal information with non-affiliated third
parties?
a. U.S. Privacy Act of 1974
b. U.S. Computer Fraud and Privacy Act of 1986
c. U.S. National Information Infrastructure Protection Act of 1996
d. Gramm Leach Bliley Act of 1999
38 Which of the following laws requires that federal agencies protect information
about private individuals that is stored in government databases?
a. U.S. Privacy Act of 1974
b. U.S. Computer Fraud and Privacy Act of 1986
c. Paperwork Reduction Act of 1995
d. Gramm Leach Bliley Act of 1999
39 Which of the following laws defines the use of a federal interest computer in a
crime as a federal offense and reduces the minimum damage required to
declare a crime a federal offence?
a. U.S. Privacy Act of 1974
b. U.S. Computer Fraud and Privacy Act of 1986
c. U.S. National Information Infrastructure Protection Act of 1996
d. Gramm Leach Bliley Act of 1999
Page 6
40 Which of the following statements is true?
a. European privacy laws are less restrictive than those of the United States.
b. European privacy laws are just as restrictive than those of the United States.
c. European privacy laws are more restrictive than those of the United States.
d. European privacy laws are completely different than those of the United
States.
41 Which of the following is not a tenant of the European privacy laws?
a. Data must be collected in accordance with the law
b. Collected information cannot be disclosed to others without the consent of
the individual
c. Records kept about an individual must be accurate and timely
d. Data can only be collected with the consent of the individual
42 Which of the following is not true in regards to the European privacy laws?
a. Data can be retained indefinitely
b. Individuals can correct errors in the data collected about them
c. Data can only be used for the original purpose for which it was collected
d. Individuals are entitled to a report detailing the information retained about
them
43 Which of the following is not a common problem with the storage of personal
health and medical data?
a. Access granted to a wide range of users, such as outside partners, members,
and vendors
b. A high level of granular access control on most systems
c. Internet connectivity increases vulnerabilities to integrity and privacy of
data
d. misuse of personal medical data can have a significant negative impact on
the public perception of an organization
44 Which form of intellectual property law protects original works of authorship
for 50+ years?
a. trademark
b. patent
c. copyright
d. trade secret
45 Which form of intellectual property law defines data that is confidential and
proprietary to a specific organization?
a. trademark
b. patent
c. copyright
d. trade secret
Page 7
46 Which form of intellectual property law protects or establishes a word, name,
symbol, etc. as an identifying mark for an organization or a product?
a. trademark
b. patent
c. copyright
d. trade secret
47 Which form of intellectual property law provides the owner with 17 years of
exclusive use rights?
a. trademark
b. patent
c. copyright
d. trade secret
48 Which of the following statements is true in regards to a well-organized and
legitimate monitoring solution that records all e-mail on a business network?
a. does not provide a means to track down violations of security policy
b. does not provide a guarantee of personal privacy
c. does not clearly inform all users of the monitoring activity
d. does not make employees aware of the acceptable use of e-mail
49 Which of the following treats the unauthorized possession of information
without the intent to profit from it as a crime?
a. U.S. Computer Fraud and Privacy Act of 1986
b. Paperwork Reduction Act of 1995
c. 1991 U.S. Federal Sentencing Guidelines
d. Gramm Leach Bliley Act of 1999
50 All of the following are true regarding the 1991 U.S. Federal Sentencing
Guidelines except for?
a. Treats the unauthorized possession of information without the intent to
profit from it as a crime
b. Applies to both individuals and organizations
c. Makes the degree of punishment a function of the extent to which the
organization has demonstrated due diligence in establishing security
d. Makes the use of information that causes $1,000 or more in damages or
which impairs medical treatment as a federal crime
51 Which of the following is not a information privacy principles that health care
organizations should adhere to?
a. grant individuals the means to monitor and correct the data collected about
them
b. restrict the uses of data to those outlined when the data was originally
collected
c. maintain the secrecy of their personal information database
d. organizations that gather data should provide adequate protection for that
data
Page 8
52 Which of the following is not true about the Health Insurance Portability and
Accountability Act (HIPAA)?
a. Establishes the rights for individuals who are subjects of individually
identifiable health information
b. Defines uses and disclosures of individually identifiable health information
that should be authorized or required
c. Requires a information security officer
d. Defines specific products, standards, guidelines, and procedures for
protecting individually identifiable health information
53 Which of the following is not a recommended practice for the monitoring of email on a company network?
a. establish different levels of monitoring for each organizational staff level
b. Inform all users that monitoring is occurring via clearly visible and frequent
banner or similar warning system
c. Monitoring should be performed in a lawful and consistent manner
d. Detail who will be accessing and viewing the archived data and for how
long the data will be retained
54 Which of the following is not visible proof that due care is being practiced by
an organization in regards to security?
a. physical access controls
b. hardware backups
c. security awareness training
d. use of plenum cabling
55 Which of the following is not visible proof that due care is being practiced by
an organization in regards to security?
a. Deploying high-speed networking devices
b. Telecommunications encryption
c. Disaster recovery plans
d. Development of formalized security infrastructure documentation
56 Which of the following is not a responsibility of the Computer Incident
Response Team?
a. Managing public relations
b. Design security policies
c. Investigate intrusions
d. Report incidents
57 The 1991 U.S. Federal Sentencing Guidelines invokes the ______________
that requires that senior management of an organization perform their duties
with the same care that any normal person would exercise in the same
circumstances.
a. Prudent man rule
b. Principle of least privilege
c. Tenant of due care
d. Separation of duties requirement
Page 9
58 The U.S. Federal Sentencing Guidelines provides for a punishment for
convicted senior management that can include?
a. imprisonment
b. fines up to $290 million
c. confiscation of assets
d. seizure of public stock offerings
59 For negligence to be proven in court, what must be demonstrated or proved?
a. lack of due diligence
b. failure to comply with recognized standards
c. legally recognized obligation
d. proximate causation
60 Which of the following actions or decisions should be made after an incident
occurs?
a. determine how much damage was caused
b. determine what backup solutions should be deployed
c. determine whether additional safeguards are required
d. determine if recovery procedures should be triggered to recover from an
incident
61 When an investigation of a computer crime incident occurs, which of the
following is not true?
a. there is a compressed time frame within which to conduct the investigation
b. the investigation may interfere with the normal operations of business
c. evidence is usually tangible
d. evidence may be co-mingled with data needed for normal business
activities
62 When an investigation of a computer crime incident occurs, which of the
following is not true?
a. Evidence can be difficult to gather
b. Evidence may be damaged or altered by the normal operations of business
c. Jurisdictional responsibility may be cloudy
d. An expert or specialist is usually not required
63 Which of the following is not a responsibility of the Computer Incident
Response Team?
a. Managing network logs
b. Resolve vulnerabilities
c. Risk assessment
d. Minimize costs of incidents
64 Emergency response should be planned out before an incident occurs. Which
of the following is not an aspect of this type of planning?
a. how an incident should be reported
b. when should management be informed of an incident
c. what action should be taken when an incident is detected
d. where should the facility be located for the greatest security
Page 10
65 Emergency response should be planned out before an incident occurs. Which
of the following is not an aspect of this type of planning?
a. What constitutes a federal crime
b. What is considered an incident
c. To whom should incidents be reported
d. Who should handle the response to an incident
66 If a computer crime is suspected, which of the following is the most important
activity to perform?
a. generate post incident reports
b. trigger the emergency response team
c. restore non-critical business processes
d. do not alert the suspect
67 The standard discriminator to determine whether a subject may be the person
who committed a crime is to evaluate whether that person had all but which of
the following?
a. intention
b. means
c. motive
d. opportunity
68 The goal of an ______________ is to find the answers to who, what, when,
where, why, and how.
a. interrogation
b. interview
c. investigation
d. interpretation
69 The act of an investigation can often have numerous negative consequences for
an organization. Which of the following is not an example of one of these?
a. Maintaining individual privacy
b. The subject committing retaliatory acts
c. Negative publicity
d. Interruption of business processes
70 A committee to help with the investigation of computer crime incidents should
be established. This committee should perform all but which of the following?
a. Establish a liaison with law enforcement
b. Creating post-incident reports for use as evidence in court
c. Design a procedure for reporting IT crimes
d. Inform senior management and affect parties of the progress of an
investigation
71 Who has jurisdiction over computer crimes committed in the U.S.?
a. Local law enforcement and FBI
b. Secret Service and NIST
c. FBI and Secret Service
d. NSA and CIA
Page 11
72 Which of the following is not a valid means to collect evidence according to
the rules of evidence or the evidence life cycle?
a. gather all relevant storage media
b. use degaussing equipment
c. image the hard drive
d. print out the screen
73 Which of the following represents the proper order of the chain of evidence or
the evidence life cycle?
1. Collection
2. Discovery
3. Identification
4. Presentation
5. Preservation
6. Protection
7. Recording
8. Return
9. Transportation
a. 1,2,3,4,5,6,7,8,9
b. 8,4,2,9,5,1,3,7,6
c. 2,6,7,1,3,5,9,4,8
d. 6,5,8,3,4,1,9,7,2
74 The goal of an ______________ is to establish enough evidence to consider a
subject a witness.
a. investigation
b. interview
c. interrogation
d. interpretation
75 Which of the following is not true?
a. In an interview, an individual becomes a witness
b. In an interview, a subject becomes a witness
c. In an interrogation, a witness becomes a suspect
d. In an interrogation, a subject comes a witness
76 Which of the following is not an element of the chain of custody?
a. Whether the evidence is relevant
b. Time and location the evidence was gathered
c. Who discovered the evidence
d. Who maintained possession of the evidence
77 Which of the following is not a valid action to take when preserving evidence
for admissibility in court?
a. avoid smoke and dust
b. write protect media
c. storing electronic media in plastic bags
d. avoid magnetic fields
Page 12
78 When attempting to preserve evidence for admissibility in court, which of the
following is a valid action to take?
a. Run tripwire on the system
b. Use AES to encrypt the entire storage device
c. Defragment the storage device
d. Create a message digest using SHA
79 The original or primary evidence is also known as?
a. best evidence
b. direct evidence
c. secondary evidence
d. conclusive evidence
80 To present evidence in court, it must be all but which of the following?
a. relevant
b. permissible
c. reliable
d. sufficient
81 Aspects of the relevance of evidence include all but which of the following?
a. has not been altered
b. must show that a crime has been committed
c. shows some aspect of the perpetrator's motives
d. verifies or demonstrates what has occurred
82 Which of the following is not a valid means of identification that will allow
evidence to be admissible in court?
a. Writing on paper printouts with a permanent marker
b. Writing a identification file to a storage media
c. A recording of serial numbers from devices
d. Placing evidence in sealed and marked containers
83 What is superzap?
a. A short-duration high-voltage surge of electricity
b. A tool used to discover the source of an Internet attack even when spoofed
packets are used
c. A tool used to bypass system security in order to modify or disclose data
d. A firewall scanning tool used to detect open and active ports
84 Which of the following is not a crime committed using a computer?
a. Password theft
b. Illegal material content
c. Embezzlement
d. Physical destruction
85 Which of the following is not malicious code?
a. e-mail spam
b. A virus
c. A Trojan horse
d. A worm
Page 13
86 The oral testimony of a witness is known as?
a. best evidence
b. direct evidence
c. hearsay evidence
d. circumstantial evidence
87 What type of evidence is generally inadmissible in court?
a. best evidence
b. direct evidence
c. hearsay evidence
d. expert opinion
88 Which of the following is not an exception to the hearsay rule?
a. Evidence made during the normal process of business activity
b. Evidence in the custody of the witness on a regular basis
c. Evidence made at or near the time of the incident being investigated
d. Evidence produced as a result of the incident and exclusively for court
presentation
89 When data needed as evidence is stored with data necessary for business
operations and which is not associated with the crime, this is known as?
a. Data diddling
b. Co-mingling of data
c. Superzapping
d. Embezzlement
90 The 1991 U.S. Federal Sentencing Guidelines establish what?
a. Maximum sentences for the punishment of computer crimes
b. Multi-jurisdiction accumulation of sentencing
c. Punishment guidelines for breaking federal laws
d. Rules for a jury to follow when debating the guilt or innocence of a suspect
91 The 1991 U.S. Federal Sentencing Guidelines does what?
a. Treats the authorized possession of information with the intent to profit
from the information as a crime
b. Treats the unauthorized possession of information with the intent to profit
from the information as a crime
c. Treats the authorized possession of information without the intent to profit
from the information as a crime
d. Treats the unauthorized possession of information without the intent to
profit from the information as a crime
92 What is a script kiddy?
a. A programmer who writes malicious code
b. An attacker that employs pre-written attack tools from the Internet who is
usually unable to program and new to cyber crime
c. An administrator who automates common management tasks
d. A specialized Web based programming tool for animating menus
Page 14
93 The computer crime that attempts to alter the financial status of a nation,
disrupt their power grid, or mis-represent the capabilities of an enemy is
known as?
a. Employing the Salami technique
b. Data diddling
c. Information warfare
d. Espionage
94 Which of the following is a benefit of investigating computer crime?
a. The investigation must often take place in a compressed time frame
b. The evidence is often intangible
c. An investigation may interfere with the normal operation of business
d. Many jurisdictions have expanded the definition of property to include
electronic information
95 Which of the following is not true?
a. The investigation of a computer crime can usually be accomplished by the
same forensic specialists used for any other type of crime scene.
b. Evidence may be difficult to gather.
c. Locations of the crimes may be separated by large geographic distance even
through they were perpetrated through a computer at a single location.
d. Electronic evidence can be destroyed easily, such as booting a system,
running a program, or reading a file.
96 How is the legal requirement for applying safeguards calculated?
a. If the cost of implementing a physical access control is less than the
estimated cost of a logical access control, then a legal liability exists
b. If the loss of an exploited vulnerability is less than the estimated cost of a
safeguard, then a legal liability exists
c. If the cost of an asset is less than the cost of a safeguard, then a legal
liability exists
d. If the cost of implementing the safeguard is less than the estimated loss of
an exploited vulnerability, then a legal liability exists
97 The requirement that senior management must perform their duties with the
same care than any normal, sensible person would under similar circumstances
is known as?
a. The prudent man rule
b. The risk avoidance axiom
c. The liability avoidance method
d. Common sense
98 When identifying evidence collected at the scene of a computer crime, all but
which of the following are valid methods for identifying evidence?
a. Writing a file containing identification information to the storage media
b. Marking printouts with a permanent marker
c. Placing components in labeled bags
d. Making a list of serial numbers, makes, and models of components
Page 15
99 Which of the following is not one of the three main types of laws?
a. Criminal
b. Intellectual Property
c. Civil
d. Administrative
100The 1991 U.S. Federal Sentencing Guidelines establishes a link between the
degree/ severity of punishment and what?
a. The extent of due care
b. Size of asset loss
c. Financial cost to investors
d. Amount of liability insurance
101Which of the following is not an example of how is due care shown?
a. The presence of physical and logical access controls
b. Press releases stating such
c. Disaster recovery and business continuity plans
d. A complete set of formalized security infrastructure documentation
102Which of the following is not a means by which a company shows that due
care is properly implemented and practiced?
a. Performing security awareness training
b. Performing penetration testing against the organization
c. Deploying a homogenous network
d. Running updated anti-virus software
103Which of the following statements are true?
a. European privacy laws are more restrictive than those of the US.
b. US privacy laws are more restrictive than those of Europe.
c. European and US privacy laws are about the same.
d. Europe has far fewer privacy laws that the US.
104Evidence must be all but which of the following to be presented in court?
a. Relevant
b. Obtained in a lawful manner
c. Reliable
d. Sufficient
105Which of the following is not required in order to prove negligence in court?
a. Legally recognized obligation
b. Failure to confirm to a required standard
c. Proximate causation resulting in damage or injury
d. Violation of the prudent man rule
106The legislative branch is responsible for creating what type of law?
a. Statutory law is created by the legislative branch.
b. Common law
c. Civil law
d. Criminal law
Page 16
107Who is ultimately responsible and held liable for the lack of due care within an
organization?
a. IT staff
b. Security management team
c. Senior management
d. Department supervisors
108A copy of evidence or an oral description of its contents is known as?
a. Best evidence
b. Secondary evidence
c. Direct evidence
d. Conclusive evidence
109When collecting evidence at a crime scene, which of the following should not
be performed?
a. Collect all storage devices
b. Degauss equipment
c. Print out the screen or make a photograph of it
d. Image the hard drive before removing power
110A computer incident response team is responsible for all but which of the
following?
a. Managing public relations during an incident
b. Minimizing risks to the organization during an incident
c. Investigating intrusions
d. Updating the security policy
111Which of the following is not a component in the chain of evidence?
a. The method used to collect, obtain, or gather the evidence
b. Location of evidence when it was collected
c. Identification of individuals who possessed the evidence from the time of
collection to the present
d. The time the evidence was collected
112The Paperwork Reduction Act of 1995 does what?
a. Makes the trafficking in passwords that affects foreign commerce a federal
crime
b. Defines standards by which medical information is stored, used, and
transmitted
c. Protects the information about individuals within government databases.
d. Requires federal agencies to produce reports on the state of security for
their non-classified systems.
113A software copyright is held by the original creator for how long?
a. 7 years
b. 10 years
c. 17 years
d. 50 years or more
Page 17
114To discriminate whether an individual is the perpetrator of a crime,
investigators evaluate whether the individual had _____, ______, and _____.
Select the one answer that does not fit in the blanks.
a. Means
b. Opportunity
c. Motive
d. Collusion.
115The goal of an interrogation is to?
a. Gather enough evidence to consider the subject a suspect
b. Gather enough evidence to consider the individual a witness
c. To discern the who, what, when, where, why, and how of a crime
d. Clear the suspect of all suspicion
116Health Insurance Portability and Accountability Act (HIPAA) is a framework
to provide guidance in providing all but which of the following for a health
organization?
a. Security
b. Availability
c. Integrity
d. Privacy
117Which element of Intellectual Property law grants the owner 17 years of
exclusive use?
a. Trademark
b. Trade secret
c. Copyright
d. Patent
118Which of the following is not an element of the evidence life cycle?
a. Identification
b. Transportation
c. Destruction
d. Return to owner
119Evidence obtained from a secondary source rather than first hand knowledge
or experience is known as?
a. Secondary evidence
b. Circumstantial evidence
c. Hearsay evidence
d. Conclusive evidence
120Tempting someone into committing a crime through coercion is known as?
a. Enticement
b. A sting operation
c. Entrapment
d. Penetration testing
Page 18
121Which of the following granted customers the ability to prohibit banks and
financial institutions from sharing their personal information with nonaffiliated
third parties?
a. U.S. computer Fraud and Abuse Act
b. U.S. Privacy Act 1974
c. Gramm Leach Bliley Act of 1999
d. U.S. National Information Infrastructure Protection Act 1996
122What type of law is concerned with protection of the public and is able to
assign imprisonment as a punishment?
a. Civil law
b. Intellectual Property law
c. Criminal law
d. Regulatory law
123What branch of the US government is responsible for creating common law?
a. Legislative branch
b. Administrative agencies
c. Judicial branch
d. Presidential branch
124American companies can export any encrypted product to?
a. Any member of the European Union
b. Only to England
c. To any non-communist country in the world
d. To all countries by Iraq, China, and Vietnam.
125Electronic monitoring of online access must be performed how?
a. Using logical and technical mechanisms
b. In a legal and consistent manner
c. Only under the consent of the monitored
d. Differently for each classification of user
Page 19
Download