EXAM | COMPLETE EXAM QUESTIONS AND
CORRECT ANSWERS (GRADED A+) | VERIFIED
ANSWERS | LATEST EXAM 2025
The law requires the establishment of minimum acceptable security
practices, creation of computer security plans, and training of system users
or owners of facilities that house sensitive information ---------CORRECT
ANSWER-----------------The Computer Security Act of 1987 (CSA)
A law that allows for collection of "foreign intelligence information" between
foreign powers and agents of foreign powers using physical and electronic
surveillance. A warrant is issued by the ____________ for actions under
_______. ---------CORRECT ANSWER-----------------The Foreign
Intelligence Surveillance Act of 1978
Requires service providers that become aware of the storage or
transmission of child pornography to report it to law enforcement. ---------
CORRECT ANSWER-----------------The Child Protection and Sexual
Predator Punishment Act of 1998
Protects children 13 years of age and under from the collection and use of
their personal information by websites. ---------CORRECT ANSWER----------
-------The Children's Online Privacy Protection Act of 1998
Designed to protect persons 18 years of age and under from downloading
or viewing material considered indecent. This act has been subject to court
cases that subsequently changed some definitions and penalties. ---------
,CORRECT ANSWER-----------------The Communications Decency Act of
1996
Includes many provisions relative to the privacy and disclosure of
information in motion through and across telephony and computer
networks. ---------CORRECT ANSWER-----------------The
Telecommunications Act of 1996
Allows for collection and use of"empty" communications, which means
nonverbal and non-text communications, such as GPS information. ---------
CORRECT ANSWER-----------------The Wireless Communications and
Public Safety Act of 1999
The primary law under which a wide variety of internet and communications
information content and metadata is currently collected ---------CORRECT
ANSWER-----------------The USA PATRIOT ACT
Contains many provisions about record keeping and destruction of
electronic records relating to the management and operation of publicly
held companies ---------CORRECT ANSWER-----------------The Sarbanes-
Oxley Act of 2002
This is one of the most widely used laws in hacking cases. It covers a wide
range of crimes involving illicit access of any computer. ---------CORRECT
ANSWER-----------------18 USC 1030 Fraud and Related Activity in
Connection with Computers
, This is closely related to 1030 but covers access devices (such as routers).
---------CORRECT ANSWER-----------------18 USC 1020 Fraud and Related
Activity in Connection with Access Devices
This controversial law was enacted in 1998. It makes it a crime to publish
methods or techniques to circumvent copyright protection.
It is controversial because it has been used against legitimate researchers
publishing research papers ---------CORRECT ANSWER-----------------The
Digital Millennium Copyright Act (DMCA)
This law targets any crime related to identity theft. It is often applied in
stolen credit card cases. ---------CORRECT ANSWER-----------------18 USC
§ 1028A - Identity Theft and Aggravated Identity Theft
The process of acquiring and analyzing information stored on physical
storage media, such as computer hard drives, smartphones, GPS systems,
and removable media.
Includes both the recovery of hidden and deleted information and the
process of identifying who created a file or message. ---------CORRECT
ANSWER-----------------Disk Forensics
The study of the source and content of email as evidence, including the
identification of the sender, recipient, date, time, and origination location of
an email message. ---------CORRECT ANSWER-----------------Email
Forensics
The process of examining network traffic, including transaction logs and
real-time monitoring using sniffers and tracing. ---------CORRECT
ANSWER-----------------Network Forensics