E-DISCOVERY TEST EXAM QUESTION
WITH COMPLETE ANSWERS
Year the CFAA was adopted by Congress as an amendment to the 1984 vaguely
worded and limited scope Act - ANSWER-1986
The CFAA was created as a ________ - ANSWER-criminal statute that is referenced as
18 USC 1030
Year the National Information Infrastructure Protection Act was added to the CFAA to
cover extortion that threatens harm to a protected computer. - ANSWER-1996
Years the US PATRIOT Act made additional changes to the CFAA - ANSWER-2001
and 2006
Year the Identity Theft Enforcement and Restitution Act was passed to amend the
CFAA to allow prosecution if the victim and perpetrator are in the same state -
ANSWER-2008
Most mainframes could be accessed by what two protocols - ANSWER-Telnet or FTP
services
CERT - ANSWER-Computer Emergency and Response Team
Who is CERT affiliated with? - ANSWER-Carnegie-Mellon University
Years that CERT estimated computer intrusions increased almost 500% - ANSWER-
1991-1994
Year Ernst and Whinneys report stated that US firms were losing $3-$5 billion annually
to computer abuse - ANSWER-1987
protected computer - ANSWER-A. used exclusively for the use of a financial institution
or the US Government
B. used in or affecting interstate or foreign commerce or communication
the CFAA covers 7 types of computer offenses under Title 18 Section 1030(a) -
ANSWER-1. Accessing a pc/network w/out authorization or by exceeding authorization
2. Accessing a pc/network to collect financial info, credit info, or other info from a gov.
computer or any protected computer
3. Making a pc/network unavailable for its intended use by a department of the US
government or another entity
4. Xmitting programs, info, codes, or commands to intentionally cause harm or damage
to networks/pcs
, 5. Accessing info on a pc/network to info on a pc/network to commit fraud or cause
damage, whether intentionally or reckless action
6. Intentionally obtaining and trafficking in passwords
7. Threatening harm to a computer or network for use in extortion or a similar practice.
In the late 1990s more than _____ of hackers belonged to the orgs they hacked. -
ANSWER-70%
The year e-Discovery was first mentioned - ANSWER-1997
The year e-Discovery was first used in the legal field - ANSWER-2006
Book about 2 Russian cybercriminals who hacked into companies, schools, and ISPs
across the US - ANSWER-The Lure--Schroeder, 2012
US Code that deals with commerce and extortion threats - ANSWER-US Code Title 18,
Section 1951 and 1030 (2,3,7)
Rule that pertains to a detained witness's deposition - ANSWER-Rule 15 of the FRCrP
FRCrp - ANSWER-Federal Rules for Criminal Procedure
first case involving wiretapping - ANSWER-1928 case of Olmstead v. US (277 US 438)
Year of the Wire Tap Act - ANSWER-1968
EDI - ANSWER-electronic data interchange
EDI was created ____ - ANSWER-in the mid-1970s to make exchanging info
electronically easier
EDI's purpose - ANSWER-to automate business transactions such as purchase orders,
requests for proposals, invoices, and packing slips.
VAN - ANSWER-value-added networks
value-added networks are _____ - ANSWER-third-party service providers, similar to
ISPs, created for transferring EDI documents between companies
the EDI format for over 40 years - ANSWER-ANSI X12
UN/EDIFACT - ANSWER-United Nations/Electronic Data Interchange for
Administration, Commerce, and Transport
What is UN/EDIFACT? - ANSWER-a collection of international guidelines for
exchanging electronic info between info systems
WITH COMPLETE ANSWERS
Year the CFAA was adopted by Congress as an amendment to the 1984 vaguely
worded and limited scope Act - ANSWER-1986
The CFAA was created as a ________ - ANSWER-criminal statute that is referenced as
18 USC 1030
Year the National Information Infrastructure Protection Act was added to the CFAA to
cover extortion that threatens harm to a protected computer. - ANSWER-1996
Years the US PATRIOT Act made additional changes to the CFAA - ANSWER-2001
and 2006
Year the Identity Theft Enforcement and Restitution Act was passed to amend the
CFAA to allow prosecution if the victim and perpetrator are in the same state -
ANSWER-2008
Most mainframes could be accessed by what two protocols - ANSWER-Telnet or FTP
services
CERT - ANSWER-Computer Emergency and Response Team
Who is CERT affiliated with? - ANSWER-Carnegie-Mellon University
Years that CERT estimated computer intrusions increased almost 500% - ANSWER-
1991-1994
Year Ernst and Whinneys report stated that US firms were losing $3-$5 billion annually
to computer abuse - ANSWER-1987
protected computer - ANSWER-A. used exclusively for the use of a financial institution
or the US Government
B. used in or affecting interstate or foreign commerce or communication
the CFAA covers 7 types of computer offenses under Title 18 Section 1030(a) -
ANSWER-1. Accessing a pc/network w/out authorization or by exceeding authorization
2. Accessing a pc/network to collect financial info, credit info, or other info from a gov.
computer or any protected computer
3. Making a pc/network unavailable for its intended use by a department of the US
government or another entity
4. Xmitting programs, info, codes, or commands to intentionally cause harm or damage
to networks/pcs
, 5. Accessing info on a pc/network to info on a pc/network to commit fraud or cause
damage, whether intentionally or reckless action
6. Intentionally obtaining and trafficking in passwords
7. Threatening harm to a computer or network for use in extortion or a similar practice.
In the late 1990s more than _____ of hackers belonged to the orgs they hacked. -
ANSWER-70%
The year e-Discovery was first mentioned - ANSWER-1997
The year e-Discovery was first used in the legal field - ANSWER-2006
Book about 2 Russian cybercriminals who hacked into companies, schools, and ISPs
across the US - ANSWER-The Lure--Schroeder, 2012
US Code that deals with commerce and extortion threats - ANSWER-US Code Title 18,
Section 1951 and 1030 (2,3,7)
Rule that pertains to a detained witness's deposition - ANSWER-Rule 15 of the FRCrP
FRCrp - ANSWER-Federal Rules for Criminal Procedure
first case involving wiretapping - ANSWER-1928 case of Olmstead v. US (277 US 438)
Year of the Wire Tap Act - ANSWER-1968
EDI - ANSWER-electronic data interchange
EDI was created ____ - ANSWER-in the mid-1970s to make exchanging info
electronically easier
EDI's purpose - ANSWER-to automate business transactions such as purchase orders,
requests for proposals, invoices, and packing slips.
VAN - ANSWER-value-added networks
value-added networks are _____ - ANSWER-third-party service providers, similar to
ISPs, created for transferring EDI documents between companies
the EDI format for over 40 years - ANSWER-ANSI X12
UN/EDIFACT - ANSWER-United Nations/Electronic Data Interchange for
Administration, Commerce, and Transport
What is UN/EDIFACT? - ANSWER-a collection of international guidelines for
exchanging electronic info between info systems