ACTUAL EXAM COMPLETE 200 QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIE ANSWERS) |ALREADY GRADED
A+||BRAND NEW!!
Question 1
Which law was passed to improve the security and privacy of sensitive information in federal
computer systems, requiring minimum acceptable security practices and security plans?
A) The Foreign Intelligence Surveillance Act of 1978 (FISA)
B) The Child Protection and Sexual Predator Punishment Act of 1998
C) The Telecommunications Act of 1996
D) The USA Patriot Act
E) The Computer Security Act of 1987
Correct Answer: E) The Computer Security Act of 1987
Rationale: The Computer Security Act of 1987 is defined as "Passed to improve the security
and privacy of sensitive information in federal computer systems."
Question 2
What law allows for the collection of "foreign intelligence information" using physical and
electronic surveillance, with warrants issued by a special court?
A) The Computer Security Act of 1987
B) The Child Protection and Sexual Predator Punishment Act of 1998
C) The Telecommunications Act of 1996
D) The USA Patriot Act
E) The Foreign Intelligence Surveillance Act of 1978 (FISA)
Correct Answer: E) The Foreign Intelligence Surveillance Act of 1978 (FISA)
Rationale: The Foreign Intelligence Surveillance Act of 1978 (FISA) is defined as "A law
that allows for collection of "foreign intelligence information" between foreign powers and
agents of foreign powers using physical and electronic surveillance."
Question 3
Which act requires service providers that become aware of the storage or transmission of child
pornography to report it to law enforcement?
A) The Children's Online Privacy Protection Act of 1998 (COPPA)
B) The Communications Decency Act of 1996
C) The Telecommunications Act of 1996
D) The USA Patriot Act
E) The Child Protection and Sexual Predator Punishment Act of 1998
Correct Answer: E) The Child Protection and Sexual Predator Punishment Act of 1998
Rationale: The Child Protection and Sexual Predator Punishment Act of 1998 is defined as
"Requires service providers that become aware of the storage or transmission of child
pornography to report it to law enforcement."
,[Type here]
Question 4
Which act protects children 13 years of age and under from the collection and use of their
personal information by Web sites?
A) The Child Protection and Sexual Predator Punishment Act of 1998
B) The Communications Decency Act of 1996
C) The Telecommunications Act of 1996
D) The USA Patriot Act
E) The Children's Online Privacy Protection Act of 1998 (COPPA)
Correct Answer: E) The Children's Online Privacy Protection Act of 1998 (COPPA)
Rationale: The Children's Online Privacy Protection Act of 1998 (COPPA) is defined as
"Protects children 13 years of age and under from the collection and use of their personal
information by Web sites."
Question 5
What act was designed to protect persons 18 years of age and under from downloading or
viewing material considered indecent, though subject to subsequent court cases?
A) The Children's Online Privacy Protection Act of 1998 (COPPA)
B) The Telecommunications Act of 1996
C) The Wireless Communications and Public Safety Act of 1999
D) The USA Patriot Act
E) The Communications Decency Act of 1996
Correct Answer: E) The Communications Decency Act of 1996
Rationale: The Communications Decency Act of 1996 is defined as "Designed to protect
persons 18 years of age and under from downloading or viewing material considered
indecent."
Question 6
Which act includes many provisions relative to the privacy and disclosure of information in
motion through and across telephony and computer networks?
A) The Communications Decency Act of 1996
B) The Wireless Communications and Public Safety Act of 1999
C) The USA Patriot Act
D) The Sarbanes-Oxley Act of 2002 (SOX)
E) The Telecommunications Act of 1996
Correct Answer: E) The Telecommunications Act of 1996
Rationale: The Telecommunications Act of 1996 is defined as "Includes many provisions
relative to the privacy and disclosure of information in motion through and across
telephony and computer networks."
Question 7
What act allows for the collection and use of "empty" communications, such as GPS
information?
, [Type here]
A) The Telecommunications Act of 1996
B) The USA Patriot Act
C) The Sarbanes-Oxley Act of 2002 (SOX)
D) The Computer Security Act of 1987
E) The Wireless Communications and Public Safety Act of 1999
Correct Answer: E) The Wireless Communications and Public Safety Act of 1999
Rationale: The Wireless Communications and Public Safety Act of 1999 is defined as
"Allows for collection and use of "empty" communications, which means nonverbal and
nontext communications, such as GPS information."
Question 8
Which law is the primary one under which a wide variety of Internet and communications
information content and metadata is currently collected, with provisions to protect the identity
and privacy of U.S. citizens?
A) The Computer Security Act of 1987
B) The Foreign Intelligence Surveillance Act of 1978 (FISA)
C) The Telecommunications Act of 1996
D) The Sarbanes-Oxley Act of 2002 (SOX)
E) The USA Patriot Act
Correct Answer: E) The USA Patriot Act
Rationale: The USA Patriot Act is defined as "The primary law under which a wide variety
of Internet and communications information content and metadata is currently collected."
Question 9
What act contains many provisions about record-keeping and destruction of electronic records
relating to the management and operation of publicly held companies?
A) The Computer Security Act of 1987
B) The Telecommunications Act of 1996
C) The USA Patriot Act
D) The Wireless Communications and Public Safety Act of 1999
E) The Sarbanes-Oxley Act of 2002 (SOX)
Correct Answer: E) The Sarbanes-Oxley Act of 2002 (SOX)
Rationale: The Sarbanes-Oxley Act of 2002 (SOX) is defined as "Contains many provisions
about record-keeping and destruction of electronic records relating to the management and
operation of publicly held companies."
Question 10
What are the actions that perpetrators take to conceal their locations, activities, or identities?
A) Obfuscation
B) Encryption
C) Counter-forensics
D) Digital subterfuge