100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

E-DISCOVERY TEST EXAM QUESTION WITH COMPLETE ANSWERS

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
19-01-2025
Written in
2024/2025

E-DISCOVERY TEST EXAM QUESTION WITH COMPLETE ANSWERS

Institution
DISCOVERY LAB
Course
DISCOVERY LAB









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DISCOVERY LAB
Course
DISCOVERY LAB

Document information

Uploaded on
January 19, 2025
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

E-DISCOVERY TEST EXAM QUESTION
WITH COMPLETE ANSWERS
Year the CFAA was adopted by Congress as an amendment to the 1984 vaguely
worded and limited scope Act - ANSWER-1986

The CFAA was created as a ________ - ANSWER-criminal statute that is referenced as
18 USC 1030

Year the National Information Infrastructure Protection Act was added to the CFAA to
cover extortion that threatens harm to a protected computer. - ANSWER-1996

Years the US PATRIOT Act made additional changes to the CFAA - ANSWER-2001
and 2006

Year the Identity Theft Enforcement and Restitution Act was passed to amend the
CFAA to allow prosecution if the victim and perpetrator are in the same state -
ANSWER-2008

Most mainframes could be accessed by what two protocols - ANSWER-Telnet or FTP
services

CERT - ANSWER-Computer Emergency and Response Team

Who is CERT affiliated with? - ANSWER-Carnegie-Mellon University

Years that CERT estimated computer intrusions increased almost 500% - ANSWER-
1991-1994

Year Ernst and Whinneys report stated that US firms were losing $3-$5 billion annually
to computer abuse - ANSWER-1987

protected computer - ANSWER-A. used exclusively for the use of a financial institution
or the US Government
B. used in or affecting interstate or foreign commerce or communication

the CFAA covers 7 types of computer offenses under Title 18 Section 1030(a) -
ANSWER-1. Accessing a pc/network w/out authorization or by exceeding authorization
2. Accessing a pc/network to collect financial info, credit info, or other info from a gov.
computer or any protected computer
3. Making a pc/network unavailable for its intended use by a department of the US
government or another entity
4. Xmitting programs, info, codes, or commands to intentionally cause harm or damage
to networks/pcs

, 5. Accessing info on a pc/network to info on a pc/network to commit fraud or cause
damage, whether intentionally or reckless action
6. Intentionally obtaining and trafficking in passwords
7. Threatening harm to a computer or network for use in extortion or a similar practice.

In the late 1990s more than _____ of hackers belonged to the orgs they hacked. -
ANSWER-70%

The year e-Discovery was first mentioned - ANSWER-1997

The year e-Discovery was first used in the legal field - ANSWER-2006

Book about 2 Russian cybercriminals who hacked into companies, schools, and ISPs
across the US - ANSWER-The Lure--Schroeder, 2012

US Code that deals with commerce and extortion threats - ANSWER-US Code Title 18,
Section 1951 and 1030 (2,3,7)

Rule that pertains to a detained witness's deposition - ANSWER-Rule 15 of the FRCrP

FRCrp - ANSWER-Federal Rules for Criminal Procedure

first case involving wiretapping - ANSWER-1928 case of Olmstead v. US (277 US 438)

Year of the Wire Tap Act - ANSWER-1968

EDI - ANSWER-electronic data interchange

EDI was created ____ - ANSWER-in the mid-1970s to make exchanging info
electronically easier

EDI's purpose - ANSWER-to automate business transactions such as purchase orders,
requests for proposals, invoices, and packing slips.

VAN - ANSWER-value-added networks

value-added networks are _____ - ANSWER-third-party service providers, similar to
ISPs, created for transferring EDI documents between companies

the EDI format for over 40 years - ANSWER-ANSI X12

UN/EDIFACT - ANSWER-United Nations/Electronic Data Interchange for
Administration, Commerce, and Transport

What is UN/EDIFACT? - ANSWER-a collection of international guidelines for
exchanging electronic info between info systems

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
248
Member since
2 year
Number of followers
68
Documents
17956
Last sold
2 weeks ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions