Answer: A
Hint: The correct answer is A. Answers B, C, and D are ethical considerations of other organizations.
Answer: C
Hint: The correct answer is C, using people skills to obtain proprietary information. Answer A is software piracy, answer B is dumpster diving, and answer D is a violation of integrity
Answer: B
Hint: The correct answer is B. Answer A is not a law, answer C is not applicable because it applies to obtaining visas and so on, and answer D is not correct because the laws in answer B are more commonly used to prosecute computer crimes.
Answer: D
Hint: The correct answer is D. It is a distracter, and all of the other answers are categories under common law.
Answer: C
Hint: The correct answer is C. It defines a trade secret. Answer A refers to a patent. Answer B refers to a copyright. Answer D refers to a trademark.
Answer: B
Hint: The correct answer is B. The transmission of data to locations where equivalent personal data protection cannot be assured is NOT permissible. The other answers are EU principles.
Answer: A
Hint: Tne correct answer is A. Answer B is part of the U.S. Computer Fraud and Abuse Act. Answer C is part of the U.S. Electronic Communications Privacy Act. Answer D is part of the U.S. Computer Security Act.
Answer: B
Hint: The correct answer is B. Answer A is a distracter and is not part of the prudent man rule. Answer C is incorrect because it is not possible to guarantee that breaches of security can never occur. Answer D is incorrect because the prudent man rule does not refer to a specific goverment standard but relates to what other prudent persons would do.
Answer: A
Hint: The correct answer is A . Answer B is a distracter and has to do with weapon systems development. Answer C is not applicable. Answer D is the conventional acquisition of information from radio signals.
Answer: C
Hint: The correct answer is C. Answer A relates to physical securiy, answer B is a type of biological testing, and answer D is part of the act of gathering evidence.
Answer: C
Hint: The correct answer is C. The others refer to other laws or guidelines.
Answer: D
Hint: The correct answer is D. Answer A refers to the U.S. government Escrowed Encryption Standard. Answer B is refers to the large-scale monitoring of RF transmissions. Answer C is a distracter.
Answer: B
Hint: The correct answer is B. It is the only one of the choices where imprisonment is possible.
Answer: D
Hint: The correct answer is D. Answer A is incorrect because employees must be made aware of the monitoring if it is to be legal; answer B is incorrect because employees do not have to agree with the policy; and answer C is incorrect because the results of monitoring might be used against the employee if the corporate policy is violated.
Answer: C
Hint: The correct answer is C. Answer A is incorrect because all nations do not agree on the definition of computer crime and corresponding punishments. Answer B is incorrect because the existing laws can be applied against computer crime. Answer D is incorrect because in some countries, possession without intent to sell is considered a crime.
Answer: B
Hint: The correct answer is B. Answer A is incorrect because all risks to information systems cannot be eliminated; answer C is in correct because senior management cannot delegate its responsibility for information system security under due care; and answer D is incorrect because the cost of implementing safeguards should be less than or equal to the potential resulting losses relative to the exercise of due care.
Answer: B
Answer: A
Hint: The correct answer is A, making the other answers incorrect.
Answer: D
Hint: The correct answer is D. Answer A refers to incontrovertible evidence; answer B refers to inference from other, intermediate facts; and answer C refers to a copy of evidence or oral description of its content.
Answer: B
Hint: The correct answer is B. Answer A is incorrect because if backups are done, they usually can be located. Answer C is incorrect because evidence can be preserved using the proper procedures. Answer D is incorrect because there are exceptions to the hearsay rule.
Answer: D
Answer: C
Answer: C
Hint: The correct answer is C, the definition of enticement. Answer A is the definition of entrapment. Answers B, and D are distracters.
Answer: A
Hint: The correct answer is A. In many instances, evidence is difficult to obtain in computer crime investigation issues.
Answer: C
Hint: The correct answer is C. The other answers refer to other principles, guidelines, or rules.
Answer: C
Hint: The correct answer is C. In addition to the capabilities in answers A, B, and D, P3P does provide the site privacy practices to users in machine-readable format.
Answer: A
Hint: The correct answer is A. The other answers are distracters.
Answer: B
Hint: Answers A and D are distracters, Answer C, the 1998 Sonny Bono Copyright Term Extension Act, amends the provisions concerning duration of copyright protection. The Act states that the terms of copyright are generally extended for an additional 20 years.
Answer: D
Hint: Wire and cash transfers of $10,000 o more in a single transaction must be reported to government officials. Actions in answers A, B and C are permitted under the Patriot Act. In answers A and B, the government has new powers to subpoena electronic records and to monitor Internet traffic. In monitoring information, the government can require the assistance of ISPs and network operators. This monitoring can extend even into individual organizations. In the Patriot Act, Congress permits investigators to gather information about electronic mail without having to show probable cause that the person to be monitored had committed a crime or was intending to commit a crime . In answer C, the items cited now fall under existing search and seizure laws. A new twist is delayed notification of a search warrant would cause a suspect to flee, a search can be conducted before notification of a search warrant is given. In a related matter, the U.S. and numerous other nations have signed the Council of Europe's Cybercrime Convention. In the U.S., participation in the Convention has to be ratified by the Senate. In essence, the Convention requires the signatory nations to spy on their own residents, even if the action being monitored is illegal in the country in which the monitoring is taking place.
Answer: D