- __________ is a branch of digital forensics dealing with identifying, managing, and preserving digital information that is subject to legal hold. E-discovery
- __________ is the unauthorized entry into a computer system via any means. Computer trespass
- ____________________ is the determination of what records require storage and for how long. Data retention
- A law that is passed by a legislative branch of government is known as a(n) _______ statutory law
- A physical hard disk drive will persist data longer than a solid state drive. True
- A principal reference for rules governing the export of encryption can be found in the __________. Export Administration Regulations
- Both forensics and e-discovery are secondary processes from a business perspective. True
- Business records, printouts, and manuals are which type of evidence? Documentary evidence
- Changing a file’s extension will alter the contents of a file. False
- Check fraud is an example of computer-based fraud that deals with Internet advertising. False
- Clusters that are marked by the operating system as usable when needed are referred to as free space
- Computer trespass is only treated as a crime in the United States. False
- Evidence that is convincing or measures up without question is known as _______ Sufficient
- Export control rules for encryption technologies fall under the Wassenaar Arrangement. True
- In the United States, the primary path to privacy is via __________, whereas in Europe and other countries, it is via __________. opt-out; opt-in
- Law that is based on previous events or precedents is known as __________. common law
- Major legal awards have been decided based on failure to retain information. True
- Oral testimony that proves a specific fact with no inferences or presumptions is which type of evidence? Direct evidence
- The development of a privacy policy is an essential foundational element of a company’s privacy stance True
- The DMCA protects the rights of recording artists and the music industry. True
- The Gramm-Leach-Bliley Act is a major piece of legislation that __________. affects the financial industry and contains significant privacy provisions for individuals
- The Gramm-Leach-Bliley Act is a major piece of legislation that __________. affects the financial industry and contains significant privacy provisions for individuals
- The low risk of being caught is one of the reasons that criminals are turning to computer crime. True
- The PATRIOT Act permits the Justice Department to proceed with its rollout of the Carnival program, an eavesdropping program for the Internet. True
- The term __________ describes a series of digits near the beginning of the file that provides information about the file format. magic number
- The Wassenaar Arrangement can be described as a(n) _____ international arrangement on export controls for conventional arms and dual-use goods and technologies
- There is no recovery from data that has been changed. True
- What is a software bomb? Software that can destroy or modify files when commands are executed on the computer
- What is the Convention on Cybercrime? The first international treaty on crimes committed via the Internet and other computer networks
- Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature? Computer Fraud and Abuse Act
- Which law makes it illegal to develop, produce, and trade any device or mechanism designed to circumvent technological controls used in copy protection? Digital Millennium Copyright Act
- Which law overhauled the financial accounting standards for publicly traded firms in the United States? Sarbanes-Oxley Act
- Which law overhauled the financial accounting standards for publicly traded firms in the United States? Sarbanes-Oxley Act
- Which law was designed to enable public access to U.S. government records? FOIA – Freedom of Information Act
- Which of the following has the least volatile data? Hard disk
- Which of the following rules applies to evidence obtained in violation of the Fourth Amendment of the Constitution? Exclusionary rule
- Which term refers to a structured approach to determining the gap between desired privacy performance and actual privacy performance? Privacy impact assessment
Other Links:
See other websites for quiz:
Check on QUIZLET