CISSP Lesson 11 PreTest Flashcards
Which statement is true regarding civil law?
A) Law enforcement is used to settle disputes between individuals and organizations
B) Most laws are civil laws
C) The most often used penalty for civil offenses is community service
Most laws are civil laws
In order for evidence to be admissible in court, it must comply with all laws and regulations governing collection and maintenance.
A) TRUE
B) FALSE
TRUE
Which was introduced in the Computer Security Act of 1987?
A) Security plans are required for all federal systems that contain sensitive data
B) Legal authority for victims to pursue civil action
C) Broadened authority to cover systems used in international commerce
Security plans are required for all federal systems that contain sensitive data
Which privacy act set forth strict regulations for organizations that process or store personal medical information?
A) HIPAA
B) ECPA
C) Federal Privacy Act of 1974
HIPAA
Credit card fraud is a type of financial attack.
A) TRUE
B) FALSE
TRUE
Which constitute crimes in the original Computer Fraud and Abuse Act of 1986? Choose all that apply.
A) Modifying medical records or traffic passwords stored on a federal system
B) Unauthorized access to a federal system
C) Any use of a federal system to perpetrate fraud
D) Causing malicious damage to a federal system that exceeds $1,000
Modifying medical records or traffic passwords stored on a federal system
Unauthorized access to a federal system
Any use of a federal system to perpetrate fraud
Causing malicious damage to a federal system that exceeds $1,000
What is the purpose of a military attack in terms of computer crimes?
A) Acquire secret information
B) Destroy sensitive information
C) Sabotage systems
Acquire secret information
Which is an example of intellectual property?
A) Software used by a company to develop a product
B) Goods produced by a company
C) Brand name and image of a company
Brand name and image of a company
Which is an example of best evidence?
A) The original copy of a document
B) Witness testimony
C) Expert testimony
The original copy of a document
The first step in incident response is to call local authorities.
A) TRUE
B) FALSE
FALSE
What should be contained in an incident report? Choose all that apply.
A) Nature of the incident
B) How the incident originated
C) What tools were used to launch the incident
D) Known damage
E) Location of the incident
F) Witness accounts of the incident
Nature of the incident How the incident originated What tools were used to launch the incident Known damage Location of the incident
Which are criteria for warranting a patent? Choose all that apply. A) Product must be new B) Product must be universal C) Product must be useful D) Product must be high quality E) Product must be nonobvious
Product must be new
Product must be useful
Product must be nonobvious
Which type of incident is an attack that renders a system unavailable to authorized users? A) Scanning incident B) Denial of service incident C) Compromise incident D) Malicious code incident
Denial of service incident
Which is a type of scanning incident?
A) Eavesdropping
B) Network intrusion
C) Dumpster diving
Dumpster diving