8 - Legal, Regulations, Investigations and Compliance Flashcards
- Which RFC contains the Internet Activity Board’s “Ethics and the Internet” documentation? a. RFC 1918b. RFC 1394c. RFC 1024d. RFC 1087
D: RFC 1087 contains the Internet Activity Board’s “Ethics and the Internet” documentation.
- Which of the following is not defined as unethical and unacceptable activity by Internet Activity Board’s “Ethics and the Internet” documentation?a. Soliciting for non-profit organization donationsb. Wasting resources (people, capacity, computer) through such actionsc. Destroying the integrity of computer-based informationd. Compromising the privacy of users
A: This is not listed or defined as unethical and unacceptable activity by RFC 1087.
- The theft of small amounts of information from many sources to compile or infer data about something private or classified is known as?a. Masqueradingb. The Salami techniquec. Data diddlingd. Espionage
B: The theft of small amounts of information from many sources to compile or infer data about something private or classified is known as the Salami technique.
- Which of the following is not technically a crime according to the law?a. espionageb. fraudc. piracyd. resource waste
D: Resource waste is an inappropriate activity but not an actual crime.
- Which of the following defined the unauthorized possession of information without the intent to profit from the information as a crime?a. 1991 U.S. Federal Sentencing Guidelinesb. U.S. Computer Fraud and Abuse Actc. U.S. Privacy Act 1974d. U.S. National Information Infrastructure Protection Act 1996
A: The 1991 U.S. Federal Sentencing Guidelines defined the unauthorized possession of information without the intent to profit from the information as a crime.
- Evidence should be all but which of the following in order to be used in court?a. Reliableb. Sufficientc. Relevantd. Permissible
B: Evidence need not be sufficient.
- Which of the following is not an element or aspect of the ISC(2) code of ethics?a. CISSP certification holders are required by law to uphold the ISC(2) code of ethicsb. CISSP certification holders should adhere to the highest ethical standards of behaviorc. A condition of CISSP certification is adherence to the ISC(2) code of ethics.d. Protect society, the commonwealth, and the infrastructure
A: This is not element or aspect of the ISC(2) code of ethics, the code is not enforceable by law.
- Violation of the ISC(2) code of ethics can result in?a. Arrestb. Revocation of certificationc. Financial penaltiesd. Community service hours
B: A consequence of violating the ISC(2) code of ethics is revocation of certification.
- Which of the following is not directly specified in the cannons of the ISC(2) code of ethics?a. Act honorably, honestly, justly, responsibly, and legallyb. Provide diligent and competent service to principals.c. Don’t write malicious code such as virusesd. Advance and protect the profession
C: This is not addressed in the cannons of the ISC(2) code of ethics.
- The crime of impersonation or spoofing is also known as?a. Spammingb. Data diddlingc. Masqueradingd. Social engineering
C: Masquerading is another name for the crime of impersonation or spoofing.
- Unauthorized modification of data is known as?a. The salami technique b. Spoofingc. Malicious coded. Data diddling
D: Data diddling is the act of unauthorized modification of data.
- TEMPEST is concerned with?a. Emanation eavesdroppingb. Distributed Denial of Service attacks.c. Password theftd. Dumpster diving
A: TEMPEST is concerned with emanation eavesdropping.
- The act of extracting information from discarded materials is known as?a. Fraudb. Dumpster divingc. Information warfared. Superzapping
B: The act of extracting information from discarded materials is known as
- Which of the following is not supported by the ISC2’s CISSP code of ethics? a. promote understanding of securityb. provide competent servicec. do not disclose confidential information from clientsd. report crimes to ISC2
D: The ISC2’s CISSP code of ethics indicates that knowledge of crimes should be appropriately reported. Appropriately reporting crimes would be to inform the management of the organization and/or law enforcement. Informing ISC2 is not appropriate.
- Which of the following is not considered a violation of computer ethics?a. working overtime on an IT projectb. browsing files on the file serverc. using proprietary software without compensationd. employing another’s intellectual property without acknowledgement
A: It is not a violation of computer ethics to work overtime.
- Which of the following is not defined as unacceptable and inappropriate by the Internet Activities Board of Ethics and the Internet?a. seeking to gain unauthorized access to resourcesb. conducting commercial activities over the Internetc. destroying the integrity of computer stored informationd. wasting resources
B: Conducting commercial activities over the Internet is not defined as an unacceptable and inappropriate activity as defined by the Internet Activities Board of Ethics and the Internet.
- Which of the following is not a valid means to identify or label computer evidence?a. writing on printouts with permanent markersb. recording serial numbersc. writing a contents and ID tag file to a hard drived. photographing the contents displayed on the monitor
C: Writing a file to the hard drive may alter the evidence and therefore is an invalid means to label evidence.
- What type of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses?a. Hearsay evidenceb. Circumstantial evidencec. Secondary evidenced. Direct evidence
D: Direct evidence proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses.
- Which of the following is not an element in the ISC2’s code of ethics that all CISSP candidates must adhere to?a. conduct themselves with high standards of moral, ethical, and legal behaviorb. do not commit any unlawful actc. do not write malicious coded. report all discovered unlawful activity
C: The actual act of authoring malicious code is not a violation of the ISC2’s code of ethics. However, allowing that malicious code to affect systems is a violation.
- Which of the following is not a computer crime?a. social engineeringb. surfing pornographic Web sitesc. password sniffingd. spoofing IP addresses
B: Surfing pornographic Web sites is inappropriate in most business environments and often grounds for termination, but it is not a crime.
- Which of the following is not a crime against a computer?a. intercepting wireless network communicationsb. installing software that has not been properly purchasedc. causing a blackout of the local power grid by damaging a power stationd. testing an intrusion script against a competitor’s Web site
C: Causing a blackout of the local power grid by damaging a power station cannot be considered a crime against a computer.
- Which of these computer crimes is not like the others?a. spoofingb. Trojan horsec. masqueradingd. data diddling
D: Data diddling is the alteration of data, not the use of information to pretend to be something else.
- Which of the following is not a true statement according to the Generally Accepted Systems Security Principles (GASSP)?a. computer security supports the mission of an organizationb. computer security should be cost effectivec. computer security is not restrained by societyd. computer security should be periodically reassessed
C: Computer security is restrained by society according to GASSP.
- The U.S. Department of Health, Education, and Welfare Code of Fair Information Practices requires which of the following?a. people must be able to remove any information about themselves from databases containing personal datab. organizations maintaining personal data do not need to ensure that data isn’t misusedc. data stored about people must be timelyd. the existence of systems that maintain records of a personal nature cannot remain secret
D: The U.S. Department of Health, Education, and Welfare Code of Fair Information Practices requires that the existence of systems that maintain records of a personal nature cannot remain secret.
- Which of the following is considered a crime committed using a computer?a. illegally transferring money from one bank account to another over the Internetb. erasing a hard drive using a degaussing magnetc. setting fire to a buildingd. theft of a notebook from an airport security checkpoint
A: Illegally transferring money from one bank account to another over the Internet is a crime committed using a computer.
- Which category of common law allows for punishments to include financial penalties but not imprisonment for a conviction?a. civil lawb. criminal lawc. administrative lawd. regulatory law
A: Civil law is a category of common law that allows for financial penalties but not imprisonment.
- Which form of law focuses on the violation of government laws focused on the protection of the public?a. civil lawb. criminal lawc. administrative lawd. regulatory law
B: Criminal law focuses on the violation of government laws focused on the protection of the public.
- What form of common law is also known as tort?a. Administrative lawb. Criminal lawc. Civil lawd. Regulatory law
C: Civil law is also known as tort.
- Which of the following is not a valid countermeasure against the interception of radio frequency and other electromagnetic radiation signals by unauthorized individuals?a. sound dampening insulationb. TEMPEST equipmentc. white noise generationd. control zones
A: Sound dampening insulation is ineffective as a countermeasure against radio frequency and other electromagnetic radiation signals.
- Which of the following is not considered a computer crime?a. espionageb. natural disastersc. fraudd. embezzlement
B: Natural disasters are not a form of computer crime.
- Which of the following is not one of the types of laws found in the United States that can be used in a court of law?a. statutory lawb. administrative lawc. Islamic lawd. common law
C: Islamic law is a religious law that is found in some areas of the US, but it is not used in government courts.
- The code of federal regulations is also known as?a. statutory lawb. common lawc. case digestsd. administrative law
D: Administrative laws are also known as the code of federal regulations.
- Which of the following laws addresses confidentiality, integrity, and availability for both data and systems and encourages other countries to adopt the same framework?a. U.S. Privacy Act of 1974b. Paperwork Reduction Act of 1995c. U.S. National Information Infrastructure Protection Act of 1996d. Gramm Leach Bliley Act of 1999
C: The U.S. National Information Infrastructure Protection Act of 1996 addresses confidentiality, integrity, and availability for both data and systems and encourages other countries to adopt the same framework.
- Which of the following requires Federal Agencies to assess the security of their non-classified information systems, to provide a risk assessment, and to report the security needs of its systems?a. U.S. Privacy Act of 1974b. U.S. Computer Fraud and Privacy Act of 1986c. U.S. National Information Infrastructure Protection Act of 1996d. Paperwork Reduction Act of 1995
D: The Paperwork Reduction Act of 1995 requires Federal Agencies to assess the security of their non-classified information systems, to provide a risk assessment, and to report the security needs of its systems.
- Which of the following defines the trafficking in computer passwords as a federal crime if that activity affects interstate or foreign commerce or permits unauthorized access to government computers?a. U.S. Computer Fraud and Abuse Act of 1986b. Paperwork Reduction Act of 1995 c. U.S. National Information Infrastructure Protection Act of 1996 d. Gramm Leach Bliley Act of 1999
A: The U.S. Computer Fraud and Abuse Act of 1986 defines the trafficking in computer passwords as a federal crime if that activity affects interstate or foreign commerce or permits unauthorized access to government computers.
- Which of the following is an amendment to the U.S. Computer Fraud and Privacy Act of 1986?a. U.S. Privacy Act of 1974b. U.S. National Information Infrastructure Protection Act of 1996c. Paperwork Reduction Act of 1995d. Gramm Leach Bliley Act of 1999
B: The U.S. National Information Infrastructure Protection Act of 1996 is an amendment to the U.S. Computer Fraud and Abuse Act of 1986. The U.S. National Information Infrastructure Protection Act of 1996 addresses confidentiality, integrity, and availability for both data and systems and encourages other countries to adopt the same framework.
- Which of the following laws requires that banks give customers the option to prohibit the distribution of personal information with non-affiliated third parties?a. U.S. Privacy Act of 1974b. U.S. Computer Fraud and Abuse Act of 1986c. U.S. National Information Infrastructure Protection Act of 1996d. Gramm Leach Bliley Act of 1999
D: The Gramm Leach Bliley Act of 1999 requires that banks give customers the option to prohibit the distribution of personal information with non-affiliated third parties.
- Which of the following laws requires that federal agencies protect information about private individuals that is stored in government databases?a. U.S. Privacy Act of 1974b. U.S. Computer Fraud and Abuse Act of 1986c. Paperwork Reduction Act of 1995 d. Gramm Leach Bliley Act of 1999
A: The U.S. Privacy Act of 1974 requires that federal agencies protect information about private individuals that is stored in government databases.
- Which of the following laws defines the use of a federal interest computer in a crime as a federal offense and reduces the minimum damage required to declare a crime a federal offence?a. U.S. Privacy Act of 1974b. U.S. Computer Fraud and Abuse Act of 1986c. U.S. National Information Infrastructure Protection Act of 1996d. Gramm Leach Bliley Act of 1999
B: The U.S. Computer Fraud and Abuse Act of 1986 defines the use of a federal interest computer in a crime as a federal offense and reduces the minimum damage required to declare a crime a federal offence.
- Which of the following statements is true?a. European privacy laws are less restrictive than those of the United States. b. European privacy laws are just as restrictive than those of the United States. c. European privacy laws are more restrictive than those of the United States. d. European privacy laws are completely different than those of the United States.
C: European privacy laws are more restrictive than those of the United States.
- Which of the following is not a tenant of the European privacy laws?a. Data must be collected in accordance with the lawb. Collected information cannot be disclosed to others without the consent of the individualc. Records kept about an individual must be accurate and timelyd. Data can only be collected with the consent of the individual
D: The European privacy laws do not require consent for the collection of private data, just the distribution of such data.
- Which of the following is not true in regards to the European privacy laws?a. Data can be retained indefinitelyb. Individuals can correct errors in the data collected about themc. Data can only be used for the original purpose for which it was collectedd. Individuals are entitled to a report detailing the information retained about them
A: The European privacy laws require that data be retained for a limited and reasonable period of time defined at the time of gathering the data.
- Which of the following is not a common problem with the storage of personal health and medical data?a. Access granted to a wide range of users, such as outside partners, members, and vendorsb. A high level of granular access control on most systemsc. Internet connectivity increases vulnerabilities to integrity and privacy of datad. misuse of personal medical data can have a significant negative impact on the public perception of an organization
B: Most systems do not have a high level of granular access control and thus they are vulnerable to security violations. So, the presence of strong security is not a common problem with the storage of personal health and medical data.
- Which form of intellectual property law protects original works of authorship for 50+ years?a. trademarkb. patentc. copyrightd. trade secret
C: A copyright is a form of intellectual property law that protects original works of authorship for 50+ years.
- Which form of intellectual property law defines data that is confidential and proprietary to a specific organization?a. trademarkb. patentc. copyrightd. trade secret
D: A trade secret is a type of data defined by intellectual property law that is confidential and proprietary to a specific organization.
- Which form of intellectual property law protects or establishes a word, name, symbol, etc. as an identifying mark for an organization or a product?a. trademarkb. patentc. copyrightd. trade secret
A: A trademark is a form of intellectual property law that protects or establishes a word, name, symbol, etc. as an identifying mark for an organization or a product.
- Which form of intellectual property law provides the owner with 17 years of exclusive use rights?a. trademarkb. patentc. copyrightd. trade secret
B: A patent is a form of intellectual property law that provides the owner with 17 years of exclusive use rights.
- Which of the following statements is true in regards to a well-organized and legitimate monitoring solution that records all e-mail on a business network?a. does not provide a means to track down violations of security policyb. does not provide a guarantee of personal privacyc. does not clearly inform all users of the monitoring activityd. does not make employees aware of the acceptable use of e-mail
B: A well-organized and legitimate monitoring solution that records all e-mail on a business network does not provide a guarantee of personal privacy.
- Which of the following treats the unauthorized possession of information without the intent to profit from it as a crime?a. U.S. Computer Fraud and Privacy Act of 1986b. Paperwork Reduction Act of 1995c. 1991 U.S. Federal Sentencing Guidelinesd. Gramm Leach Bliley Act of 1999
C: The 1991 U.S. Federal Sentencing Guidelines treats the unauthorized possession of information without the intent to profit from it as a crime.
- All of the following are true regarding the 1991 U.S. Federal Sentencing Guidelines except for?a. Treats the unauthorized possession of information without the intent to profit from it as a crime b. Applies to both individuals and organizationsc. Makes the degree of punishment a function of the extent to which the organization has demonstrated due diligence in establishing securityd. Makes the use of information that causes $1,000 or more in damages or which impairs medical treatment as a federal crime
D: The U.S. Computer Fraud and Abuse Act makes the use of information that causes $1,000 or more in damages or which impairs medical treatment as a federal crime.