IT 357 - Final Exam Study Set(IT 357 - GMU IT Study material) WITH COMPLETE SOLUTIONS
4th Amendment Correct Answer: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated and no warrants shall issue without probable cause. 6th Amendment Correct Answer: In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed, which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witness against him. Affidavit Correct Answer: A written sworn statement of fact voluntarily made by an affiant or deponent under an oath or affirmation administered by a person authorized to do so by law. Bag and tag Correct Answer: The process of photographing, documenting, and collecting evidence to preserve it for use in court. Bit stream image Correct Answer: Bit stream image of a disk drive is a clone copy of it. It copies virtually everything included in the drive, including sectors and clusters, which makes it possible to retrieve files that were deleted from the drive. Bit by bit image Correct Answer: A clone (direct copy) of the data identical to how it is stored on the original drive. Forensic image Correct Answer: An exact, sector by sector, copy of a hard disk, taken using software. California v. Greenwood Correct Answer: California v. Greenwood (1988), Supreme court ruled that the Fourth Amendment does not prohibit the warrantless search and seizure of garbage left for collection outside the confines of a home. CAN-SPAM Correct Answer: The CAN SPAM Act of 2003, signed into law and establishes the United States first national standards for the sending of commercial email and requires the Federal Trade Commission (FTC) to enforce its provisions CDMA Correct Answer: Code Division multiple access (CDMA) is a channel access method used by various radio communication technologies. Multiple access. CFAA Correct Answer: Computer Fraud and Abuse Act (CFAA) was enacted by Congress in 1986 is an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. Written to clarify and increase the scope of the previous federal jurisdiction to cases of "federal interest"
Written for
- Institution
-
George Mason University
- Course
-
IT 357
Document information
- Uploaded on
- November 29, 2022
- Number of pages
- 15
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it 357 final exam study setit 357 gmu it study material with complete solutions
Also available in package deal