1.Which law overhauled the financial accounting standards for publicly traded firms in the United States?
A) Sarbanes-Oxley Act
2.Which law regulates unsolicited commercial e-mail?
A) CAN-SPAM Act
3.Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature?
A) Computer Fraud and Abuse Act
4.The low risk of being caught is one of the reasons that criminals are turning to computer crime.
A) True
5.__________ is the unauthorized entry into a computer system via any means.
A) Computer trespass
6.The Wassenaar Arrangement can be described as a(n) __________.
A) international arrangement on export controls for conventional arms and dual-use goods and technologies
7.Two major laws that provide wide-sweeping tools for law enforcement to convict people who hack into computers or use them to steal information are the SOX and the CFAA.
A) False
8.One characteristic of the USA PATRIOT Act of 2001 is that it __________.
A) extends the tap and trace provisions of existing wiretap statutes to the Internet
9.In categorizing computer crimes, the differentiating factor is in how the computer is specifically involved from the criminal’s point of view.
A) True
10.The DMCA protects the rights of recording artists and the music industry.
A) True
11.Which term refers to a structured approach to determining the gap between desired privacy performance and actual privacy performance?
A) Privacy impact assessment
12.Which act requires credit agencies to perform timely investigations on inaccuracies reported by consumers?
A) FCRA
13.Gramm-Leach-Bliley Act (GLBA) was designed to enable public access to U.S. government records.
A) False
14.What is the mechanism for self-regulation that can be enforced through trade practice law via the FTC?
A) Safe Harbor
15.A school principle allows for student information to be accessed by a marketing company in exchange for goods and services for the school. The principle may have violated which law?
A) FERPA
16.The EU has developed a comprehensive concept of privacy, which is administered via a set of statutes known as __________.
A) data protection
17.A video rental store shares its customer database with a private investigator. The rental store may have violated which law?
A) VPPA
18.__________ requires that sites obtain parental permission, post a privacy policy detailing specifics concerning information collected from children, and describe how the children’s information will be used.
A) COPPA
19.A patient’s medical records are shared with a third party who is not a medical professional and without the patient’s approval. Which law may have been violated?
A) HIPAA
20.In the United States, the primary path to privacy is via opt-in.
A) False
Other Links:
Statistics Quiz
Networking Quiz
See other websites for quiz:
Check on QUIZLET
Check on CHEGG
Thanking you Mark