Computer Fraud and Abuse Flashcards
Which federal law amended Chapter 119 of Title 18, U.S. Code?
U.S. PATRIOT Act, Sec. 217: Interception of Computer Trespasser Communications
To determine whether scanning is illegal in your area, you should do which of the following?
Refer to State Laws
The U.S. Department of Justice defines a hacker as which of the following?
A person who accesses a computer or network without the owner’s permission
What professional level security certification requires five years of experience and is designed to focus an applicant’s security-related managerial skills?
Certified Information Systems Security Professional
What specific term does the U.S Department of Justice use to label all illegal access to a computer or network systems?
Hacking
A written contract isn’t necessary when a friend recommends a client. True or False?
False
What term best describes a person who hacks computer systems for political or social reasons?
Hacktivist
What is OSCP?
Offensive Security Certified Professional
What organization disseminates research documents on the computer and network security worldwide at no cost?
SANS
Which federal law prohibits intercepting any communication, regardless of how it was transmitted?
Electronic Communication Privacy Act
If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?
Red Team
What policy, provided by a typical ISP, should be read and understood before performing any port scanning outside of your private network?
Acceptable Use Policy
Which organization issues the Top 25 list of software errors?
SANS institute
What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?
Certified Ethical Hacker (CEH)
Many experienced penetration testers will write a set of instructions that run in sequence to perform tasks on a computer system. What type of resource are these penetration testers utilizing?
Scripts