Deck 10: Legal, Regulations, Investigations, and Compliance

ملء الشاشة (f)
exit full mode
سؤال
When criminals use computers to help them steal confidential organizational data, a computer-assisted crime has occurred.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Software piracy is an example of computer prevalence crime.
سؤال
Civil/tort law is a group of laws that recognizes exclusive rights for creations of the mind.
سؤال
Most organizations that have trademarks attempt to protect these secrets using nondisclosure agreements (NDAs).
سؤال
PII is any piece of data that can be used alone or with other information to identify a single person.
سؤال
The Electronic Communications Privacy Act (ECPA) of 1986 affects law enforcement and intelligence agencies.
سؤال
The purpose of the USA PATRIOT Act of 2001 is to enhance the investigatory tools that law enforcement can use, including e-mail communications, telephone records, Internet communications, medical records, and financial records.
سؤال
A safe harbor is a country that fails to legally protect personal data with the main aim being to attract companies engaged in the collection of the data.
سؤال
Due care and due diligence are independent of each other.
سؤال
When investigating a computer crime, evidentiary rules do not need to be addressed.
سؤال
Which computer crime occurs when a computer is involved in a computer crime without being the victim of the attack or the attacker?

A) Computer prevalence crime
B) Computer targeted crime
C) Computer-assisted crime
D) Incidental computer crime
سؤال
Which type of law reflects on the morals of the people and relies heavily on precedence?

A) Civil/tort law
B) Criminal law
C) Common law
D) Civil code law
سؤال
Which intellectual property right is granted to an individual or company to cover an invention C described in the application?

A) Copyright
B) Patent
C) Trademark
D) Trade secret
سؤال
What is another word for shareware?

A) Trialware
B) Freeware
C) Commercial software
D) Software piracy
سؤال
Which law affects any organization that is publicly traded in the United States?

A) Computer Fraud and Abuse Act (CFAA) of 1986
B) Gramm-Leach-Bliley Act (GLBA) of 1999
C) Health Insurance Portability and Accountability Act (HIPAA)
D) Sarbanes-Oxley (SOX) Act
سؤال
Which act affects how private sector organizations collect, use, and disclose personal information in the course of commercial business in Canada?

A) Electronic Communications Privacy Act (ECPA) of 1986
B) Payment Card Industry Data Security Standard (PCI DSS)
C) Personal Information Protection and Electronic Documents Act (PIPEDA)
D) Basel II
سؤال
Which of the following is NOT part of the EU Principles on Privacy?

A) Data should be collected in accordance with the law.
B) Data should be used for any purpose for which it is needed.
C) Data should be used only for a reasonable period of time.
D) Information transferred to other organizations can be transferred only if the sharing organization has adequate security in place.
سؤال
Which term is all about gathering information?

A) Due diligence
B) Due care
C) Negligence
D) Liability
سؤال
What is the second step of the incident response procedure?

A) Detect the incident.
B) Report the incident.
C) Recover from the incident.
D) Respond to the incident.
سؤال
What is the first step in the order of volatility?

A) System processes
B) Network processes
C) Memory
D) Swap files
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Legal, Regulations, Investigations, and Compliance
1
When criminals use computers to help them steal confidential organizational data, a computer-assisted crime has occurred.
True
2
Software piracy is an example of computer prevalence crime.
True
3
Civil/tort law is a group of laws that recognizes exclusive rights for creations of the mind.
False
4
Most organizations that have trademarks attempt to protect these secrets using nondisclosure agreements (NDAs).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
PII is any piece of data that can be used alone or with other information to identify a single person.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
The Electronic Communications Privacy Act (ECPA) of 1986 affects law enforcement and intelligence agencies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
The purpose of the USA PATRIOT Act of 2001 is to enhance the investigatory tools that law enforcement can use, including e-mail communications, telephone records, Internet communications, medical records, and financial records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
A safe harbor is a country that fails to legally protect personal data with the main aim being to attract companies engaged in the collection of the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Due care and due diligence are independent of each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
When investigating a computer crime, evidentiary rules do not need to be addressed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which computer crime occurs when a computer is involved in a computer crime without being the victim of the attack or the attacker?

A) Computer prevalence crime
B) Computer targeted crime
C) Computer-assisted crime
D) Incidental computer crime
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which type of law reflects on the morals of the people and relies heavily on precedence?

A) Civil/tort law
B) Criminal law
C) Common law
D) Civil code law
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which intellectual property right is granted to an individual or company to cover an invention C described in the application?

A) Copyright
B) Patent
C) Trademark
D) Trade secret
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is another word for shareware?

A) Trialware
B) Freeware
C) Commercial software
D) Software piracy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which law affects any organization that is publicly traded in the United States?

A) Computer Fraud and Abuse Act (CFAA) of 1986
B) Gramm-Leach-Bliley Act (GLBA) of 1999
C) Health Insurance Portability and Accountability Act (HIPAA)
D) Sarbanes-Oxley (SOX) Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which act affects how private sector organizations collect, use, and disclose personal information in the course of commercial business in Canada?

A) Electronic Communications Privacy Act (ECPA) of 1986
B) Payment Card Industry Data Security Standard (PCI DSS)
C) Personal Information Protection and Electronic Documents Act (PIPEDA)
D) Basel II
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT part of the EU Principles on Privacy?

A) Data should be collected in accordance with the law.
B) Data should be used for any purpose for which it is needed.
C) Data should be used only for a reasonable period of time.
D) Information transferred to other organizations can be transferred only if the sharing organization has adequate security in place.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which term is all about gathering information?

A) Due diligence
B) Due care
C) Negligence
D) Liability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is the second step of the incident response procedure?

A) Detect the incident.
B) Report the incident.
C) Recover from the incident.
D) Respond to the incident.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the first step in the order of volatility?

A) System processes
B) Network processes
C) Memory
D) Swap files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.