Chapters 23 & 24 Quiz

1. __________ is a branch of digital forensics dealing with identifying, managing, and preserving digital information that is subject to legal hold. A. E-discovery

2. __________ is the unauthorized entry into a computer system via any means. A. Computer trespass

3. A law that is passed by a legislative branch of government is known as a(n) __________. A. statutory law

4. Clusters that are marked by the operating system as usable when needed are referred to as __________. A. free space

5. Evidence offered by a witness that is not based on the personal knowledge of the witness, but is being offered to prove the truth of the matter asserted, falls under which rule of evidence? A. Hearsay rule

6. Evidence that is material to the case or has bearing on the matter at hand is known as __________. A. relevant evidence

7. Evidence that must be legally qualified and reliable is known as __________. A. competent evidence

8. One characteristic of the USA PATRIOT Act of 2001 is that it __________. A. extends the tap and trace provisions of existing wiretap statutes to the Internet

9. Oral testimony that proves a specific fact with no inferences or presumptions is which type of evidence? A. Direct evidence

10. Tangible objects that prove or disprove fact are what type of evidence? A. Real evidence

11. The Electronic Communications Privacy Act (ECPA) of 1986 __________. A. addresses a myriad of legal privacy issues that resulted from the increasing use of computers and other technology specific to telecommunications

12. The Electronic Signatures in Global and National Commerce Act __________. A. implements the principle that a signature, contract, or other record may not be denied legal effect, validity, or enforceability solely because it is in electronic form

13. The term __________ describes a series of digits near the beginning of the file that provides information about the file format. A. magic number

14. What is a software bomb? A. Software that can destroy or modify files when commands are executed on the computer

15. What is the Convention on Cybercrime? A. The first international treaty on crimes committed via the Internet and other computer networks

16. What type of evidence is used to aid a jury and may be in the form of a model, experiment, chart, and so on, to indicate that an event occurred? A. Demonstrative evidence

17. Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature? A. Computer Fraud and Abuse Act

18. Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection? A. Digital Millennium Copyright Act

19. Which law overhauled the financial accounting standards for publicly traded firms in the United States? A. Sarbanes-Oxley Act

20. Which law regulates unsolicited commercial e-mail? A. CAN-SPAM Act

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *