CYBERSECURITY TASK 2 FINAL PAPER
2026 SOLVED QUESTIONS WITH VERIFIED
SOLUTIONS
⫸ Which law is related to the disclosure of personally identifiable
protected health information (PHI)? Answer: Health Insurance
Portability and Accountability Act (HIPAA)
⫸ Which U.S. law criminalizes the act of knowingly using a misleading
domain name with the intent to deceive a minor into viewing harmful
material? Answer: 18 U.S.C. 2252B
⫸ Which U.S. law protects journalists from turning over their work or
sources to law enforcement before the information is shared with the
public? Answer: The Privacy Protection Act (PPA)
⫸ Which law or guideline lists the four states a mobile device can be in
when data is extracted from it? Answer: NIST SP 800-72 Guidelines
⫸ Which law includes a provision permitting the wiretapping of VoIP
calls? Answer: Communications Assistance to Law Enforcement Act
(CALEA
⫸ Which policy is included in the CAN-SPAM Act? Answer: The email
sender must provide some mechanism whereby the receiver can opt out
, of future emails and that method cannot require the receiver to pay in
order to opt out.
⫸ Which United States law requires telecommunications equipment
manufacturers to provide built-in surveillance capabilities for federal
agencies? Answer: Communication Assistance to Law Enforcement Act
(CALEA)
⫸ Which law requires a search warrant or one of the recognized
exceptions to the search warrant requirements for searching email
messages on a computer? Answer: The Fourth Amendment to the U.S.
Constitution
⫸ During a cyber-forensics investigation, a USB drive was found that
contained multiple pictures of the same flower.
How should an investigator use properties of a file to detect
steganography? Answer: Review the hexadecimal code looking for
anomalies in the file headers and endings using a tool such as EnCase
⫸ A system administrator believes data are being leaked from the
organization. The administrator decides to use steganography to hide
tracking information in the types of files he thinks are being leaked.
Which steganographic term describes this tracking information?
Answer: Payload