CYBERSECURITY TASK 2 TEST BANK 2026
COMPLETE QUESTION SET WITH FULL
SOLUTION
⫸ The Foreign Intelligence Surveillance Act of 1978 (FISA) Answer: A
law that allows for collection of "foreign intelligence information"
between foreign powers and agents of foreign powers using physical and
electronic surveillance. A warrant is issued by a special court created by
this Act for actions under this Act.
⫸ The Child Protection and Sexual Predator Punishment Act of 1998
Answer: Requires service providers that become aware of the storage or
transmission of child pornography to report it to law enforcement.
⫸ The Children's Online Privacy Protection Act of 1998 (COPPA)
Answer: Protects children 13 years of age and under from the collection
and use of their personal information by Web sites. This act replaces the
Child Online Protection Act of 1988 (COPA), which was determined to
be unconstitutional.
⫸ The Communications Decency Act of 1996 Answer: Designed to
protect persons 18 years of age and under from downloading or viewing
material considered indecent. This act has been subject to court cases
that subsequently changed some definitions and penalties
, ⫸ The Telecommunications Act of 1996 Answer: Includes many
provisions relative to the privacy and disclosure of information in
motion through and across telephony and computer networks.
⫸ The Wireless Communications and Public Safety Act of 1999
Answer: Allows for collection and use of "empty" communications,
which means nonverbal and nontext communications, such as GPS
information.
⫸ The USA Patriot Act Answer: The primary law under which a wide
variety of Internet and communications information content and
metadata is currently collected. Provisions exist within the Act to protect
the identity and privacy of U.S. citizens
⫸ The Sarbanes-Oxley Act of 2002 (SOX) Answer: Contains many
provisions about record-keeping and destruction of electronic records
relating to the management and operation of publicly held companies.
⫸ Anti-forensics Answer: The actions that perpetrators take to conceal
their locations, activities, or identities.
⫸ Cell-phone forensics Answer: The process of searching the contents
of cell phones.
⫸ Chain of custody Answer: The continuity of control of evidence that
makes it possible to account for all that has happened to evidence