Deck 4: Cybercrime Law: a United States Perspective

ملء الشاشة (f)
exit full mode
سؤال
Which of the following rights is not explicitly mentioned in the US Constitution?

A) Right of the people to keep and bear arms
B) Right of personal privacy
C) Right of the people peaceably to assemble
D) Right to a speedy and public trial
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Under the CFAA, it is a Federal crime to knowingly transfer, possess, or use a means of identification of another person without being authorized, with the intent to commit or to aid or abet any unlawful activity. The session that addresses this is:

A) 1028(a)(5)
B) 1028(a)(6)
C) 1028(a)(7)
D) 1028(a)(8)
سؤال
The legislation that made the theft of trade secrets a Federal crime was

A) The Lanham Act
B) The Economic Espionage Act
C) The Child Pornography Protection Act
D) None of the above
سؤال
All cybercrimes can be addressed using existing laws.
سؤال
Long-arm statutes enable US states to enforce their laws on out-of-state individuals or organizations.
سؤال
A single photograph can be deemed acceptable in California and obscene in
Tennessee.
سؤال
In the US and UK, it is legal to possess child pornography but illegal to distribute it to others.
سؤال
In those states with legislation addressing computer forgery, contraband in the form of "forgery devices" may include:

A) Computers
B) Computer equipment
C) Specialized computer software
D) All of the above
سؤال
Which state does not have a law prohibiting simple hacking - gaining unauthorized access to a computer?

A) California
B) Texas
C) Washington
D) None of the above
سؤال
The term "computer contaminant" refers to:

A) Excessive dust found inside the computer case
B) Viruses, worms, and other malware
C) Spam e-mails
D) Nigerian scam e-mails
سؤال
Which of the following is not a consideration in determining "fair use" of copyrighted materials?

A) The purpose and character of the use
B) The amount and substantiality of the portion of the copyrighted work used
C) The expense involved in creating the original material
D) Effect on the potential market for the work
سؤال
Under the CFAA, the provision that is used to prosecute those who create or spread viruses, worms, and other malware is:

A) 1030(a)(5)(A)
B) 1030(a)(5)(B)
C) 1030(a)(5)(C)
D) 1030(a)(5)(D)
سؤال
In the case of New York v. Ferber, in 1982, the Supreme Court defined child pornography as:

A) Sketches from the imagination or literary descriptions of children engaged in sexual activities
B) Visual depictions of sexual conduct by children or by persons who look younger than their actual age
C) Works that visually depict explicit sexual conduct by children below a specified age
D) Any public or private materials depicting children engaged in sexual activities no matter the medium
سؤال
Compelling a suspect to reveal passwords to provide access to encrypted media is considered to fall under the:

A) Second Amendment
B) Fourth Amendment
C) Fifth Amendment
D) Seventh Amendment
سؤال
The criminal justice systems in the EU and US work in essentially the same way.
سؤال
Which of the following occurred most recently?

A) Communications Decency Act (CDA)
B) Ashcroft v. American Civil Liberties Union
C) Child Online Protection Act (COPA)
D) Reno v. American Civil Liberties Union
سؤال
The definition of a "protected computer" is, according to the CFAA:

A) A computer that is used exclusively by a financial institution or the Federal government.
B) A computer that is used non-exclusively by a financial institution or the Federal government and the crime affects that use.
C) A computer that is used in state or foreign commerce or communication.
D) All of the above.
سؤال
In the US, to enforce a judgment over a defendant, a court must have which of the following?

A) Subject matter and personal jurisdiction
B) General and limited jurisdiction
C) Diversity and long arm jurisdiction
D) None of the above
سؤال
What is one of the most complex aspects of jurisdiction when the Internet is involved?

A) Arranging to travel to remote locations to apprehend criminals
B) Determining which court can enforce a judgment over a defendant
C) Finding a court that is in two states
D) Finding a federal court that can hear a civil suit
سؤال
The Miller test takes which of the following into account when determining if pornography is obscene?

A) It appeals to the public interest
B) It depicts sexual conduct in a patently offensive way
C) It lacks any monetary value
D) All of the above
سؤال
The US Fourth Amendment prohibits employers from unauthorized searches and seizures of their employees.
سؤال
The US Electronic Communications Privacy Act prohibits employers from unauthorized searches and seizures of their employees' electronic communications.
سؤال
The US First Amendment protects obscenity but not child pornography.
سؤال
In the US, the government does not require a search warrant to observe an individual's home from outside its walls using "radar-based through-the-wall surveillance systems."
سؤال
In the US, the government does not require a warrant to search through garbage/rubbish bags left outside of an individual's home.
سؤال
Privacy is a clearly defined concept according to US law.
سؤال
Copyright law does not prohibit individuals from downloading digital copies of protected materials without paying because it is considered fair use.
سؤال
In the US, the government may require a warrant to search a public area.
سؤال
Virtual child pornography is illegal under UK law but not US law.
سؤال
The Fourth Amendment addresses the citizens' right to bear arms.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Cybercrime Law: a United States Perspective
1
Which of the following rights is not explicitly mentioned in the US Constitution?

A) Right of the people to keep and bear arms
B) Right of personal privacy
C) Right of the people peaceably to assemble
D) Right to a speedy and public trial
B
2
Under the CFAA, it is a Federal crime to knowingly transfer, possess, or use a means of identification of another person without being authorized, with the intent to commit or to aid or abet any unlawful activity. The session that addresses this is:

A) 1028(a)(5)
B) 1028(a)(6)
C) 1028(a)(7)
D) 1028(a)(8)
C
3
The legislation that made the theft of trade secrets a Federal crime was

A) The Lanham Act
B) The Economic Espionage Act
C) The Child Pornography Protection Act
D) None of the above
B
4
All cybercrimes can be addressed using existing laws.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
Long-arm statutes enable US states to enforce their laws on out-of-state individuals or organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
A single photograph can be deemed acceptable in California and obscene in
Tennessee.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
In the US and UK, it is legal to possess child pornography but illegal to distribute it to others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
In those states with legislation addressing computer forgery, contraband in the form of "forgery devices" may include:

A) Computers
B) Computer equipment
C) Specialized computer software
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which state does not have a law prohibiting simple hacking - gaining unauthorized access to a computer?

A) California
B) Texas
C) Washington
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
The term "computer contaminant" refers to:

A) Excessive dust found inside the computer case
B) Viruses, worms, and other malware
C) Spam e-mails
D) Nigerian scam e-mails
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is not a consideration in determining "fair use" of copyrighted materials?

A) The purpose and character of the use
B) The amount and substantiality of the portion of the copyrighted work used
C) The expense involved in creating the original material
D) Effect on the potential market for the work
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
Under the CFAA, the provision that is used to prosecute those who create or spread viruses, worms, and other malware is:

A) 1030(a)(5)(A)
B) 1030(a)(5)(B)
C) 1030(a)(5)(C)
D) 1030(a)(5)(D)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
In the case of New York v. Ferber, in 1982, the Supreme Court defined child pornography as:

A) Sketches from the imagination or literary descriptions of children engaged in sexual activities
B) Visual depictions of sexual conduct by children or by persons who look younger than their actual age
C) Works that visually depict explicit sexual conduct by children below a specified age
D) Any public or private materials depicting children engaged in sexual activities no matter the medium
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Compelling a suspect to reveal passwords to provide access to encrypted media is considered to fall under the:

A) Second Amendment
B) Fourth Amendment
C) Fifth Amendment
D) Seventh Amendment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
The criminal justice systems in the EU and US work in essentially the same way.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following occurred most recently?

A) Communications Decency Act (CDA)
B) Ashcroft v. American Civil Liberties Union
C) Child Online Protection Act (COPA)
D) Reno v. American Civil Liberties Union
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
The definition of a "protected computer" is, according to the CFAA:

A) A computer that is used exclusively by a financial institution or the Federal government.
B) A computer that is used non-exclusively by a financial institution or the Federal government and the crime affects that use.
C) A computer that is used in state or foreign commerce or communication.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the US, to enforce a judgment over a defendant, a court must have which of the following?

A) Subject matter and personal jurisdiction
B) General and limited jurisdiction
C) Diversity and long arm jurisdiction
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is one of the most complex aspects of jurisdiction when the Internet is involved?

A) Arranging to travel to remote locations to apprehend criminals
B) Determining which court can enforce a judgment over a defendant
C) Finding a court that is in two states
D) Finding a federal court that can hear a civil suit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
The Miller test takes which of the following into account when determining if pornography is obscene?

A) It appeals to the public interest
B) It depicts sexual conduct in a patently offensive way
C) It lacks any monetary value
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
The US Fourth Amendment prohibits employers from unauthorized searches and seizures of their employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
The US Electronic Communications Privacy Act prohibits employers from unauthorized searches and seizures of their employees' electronic communications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
The US First Amendment protects obscenity but not child pornography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
In the US, the government does not require a search warrant to observe an individual's home from outside its walls using "radar-based through-the-wall surveillance systems."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
In the US, the government does not require a warrant to search through garbage/rubbish bags left outside of an individual's home.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
Privacy is a clearly defined concept according to US law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
Copyright law does not prohibit individuals from downloading digital copies of protected materials without paying because it is considered fair use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
In the US, the government may require a warrant to search a public area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
Virtual child pornography is illegal under UK law but not US law.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
The Fourth Amendment addresses the citizens' right to bear arms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.