1. __________ is a branch of digital forensics dealing with identifying, managing, and preserving digital information that is subject to legal hold.   E-discovery
  2. __________ is the unauthorized entry into a computer system via any means.  Computer trespass
  3. ____________________ is the determination of what records require storage and for how long.  Data retention
  4. A law that is passed by a legislative branch of government is known as a(n) _______   statutory law
  5. A physical hard disk drive will persist data longer than a solid state drive.   True
  6. A principal reference for rules governing the export of encryption can be found in the __________.   Export Administration Regulations
  7. Both forensics and e-discovery are secondary processes from a business perspective.  True
  8. Business records, printouts, and manuals are which type of evidence?   Documentary evidence
  9. Changing a file’s extension will alter the contents of a file.   False
  10. Check fraud is an example of computer-based fraud that deals with Internet advertising.  False
  11. Clusters that are marked by the operating system as usable when needed are referred to as   free space
  12. Computer trespass is only treated as a crime in the United States.   False
  13. Evidence that is convincing or measures up without question is known as _______   Sufficient
  14. Export control rules for encryption technologies fall under the Wassenaar Arrangement.   True
  15. In the United States, the primary path to privacy is via __________, whereas in Europe and other countries, it is via __________.  opt-out; opt-in
  16. Law that is based on previous events or precedents is known as __________.   common law
  17. Major legal awards have been decided based on failure to retain information.   True
  18. Oral testimony that proves a specific fact with no inferences or presumptions is which type of evidence?  Direct evidence
  19. The development of a privacy policy is an essential foundational element of a company’s privacy stance   True
  20. The DMCA protects the rights of recording artists and the music industry.    True
  21. The Gramm-Leach-Bliley Act is a major piece of legislation that __________.   affects the financial industry and contains significant privacy provisions for individuals
  22. The Gramm-Leach-Bliley Act is a major piece of legislation that __________.  affects the financial industry and contains significant privacy provisions for individuals
  23. The low risk of being caught is one of the reasons that criminals are turning to computer crime.  True
  24. The PATRIOT Act permits the Justice Department to proceed with its rollout of the Carnival program, an eavesdropping program for the Internet.   True
  25. The term __________ describes a series of digits near the beginning of the file that provides information about the file format.   magic number
  26. The Wassenaar Arrangement can be described as a(n) _____   international arrangement on export controls for conventional arms and dual-use goods and technologies
  27. There is no recovery from data that has been changed.   True
  28. What is a software bomb?   Software that can destroy or modify files when commands are executed on the computer
  29. What is the Convention on Cybercrime?  The first international treaty on crimes committed via the Internet and other computer networks
  30. Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature?   Computer Fraud and Abuse Act
  31. Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection?   Digital Millennium Copyright Act
  32. Which law overhauled the financial accounting standards for publicly traded firms in the United States?   Sarbanes-Oxley Act
  33. Which law overhauled the financial accounting standards for publicly traded firms in the United States?   Sarbanes-Oxley Act
  34. Which law was designed to enable public access to U.S. government records?   FOIA – Freedom of Information Act
  35. Which of the following has the least volatile data?   Hard disk
  36. Which of the following rules applies to evidence obtained in violation of the Fourth Amendment of the Constitution?  Exclusionary rule
  37. Which term refers to a structured approach to determining the gap between desired privacy performance and actual privacy performance?   Privacy impact assessment

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *