1.Which law overhauled the financial accounting standards for publicly traded firms in the United States?
A) Sarbanes-Oxley Act

2.Which law regulates unsolicited commercial e-mail?
A) CAN-SPAM Act

3.Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature?
A) Computer Fraud and Abuse Act

4.The low risk of being caught is one of the reasons that criminals are turning to computer crime.
A) True

5.__________ is the unauthorized entry into a computer system via any means.
A) Computer trespass

6.The Wassenaar Arrangement can be described as a(n) __________.
A) international arrangement on export controls for conventional arms and dual-use goods and technologies

7.Two major laws that provide wide-sweeping tools for law enforcement to convict people who hack into computers or use them to steal information are the SOX and the CFAA.
A) False

8.One characteristic of the USA PATRIOT Act of 2001 is that it __________.
A) extends the tap and trace provisions of existing wiretap statutes to the Internet

9.In categorizing computer crimes, the differentiating factor is in how the computer is specifically involved from the criminal’s point of view.
A) True

10.The DMCA protects the rights of recording artists and the music industry.
A) True

11.Which term refers to a structured approach to determining the gap between desired privacy performance and actual privacy performance?
A) Privacy impact assessment

12.Which act requires credit agencies to perform timely investigations on inaccuracies reported by consumers?
A) FCRA

13.Gramm-Leach-Bliley Act (GLBA) was designed to enable public access to U.S. government records.
A) False

14.What is the mechanism for self-regulation that can be enforced through trade practice law via the FTC?
A) Safe Harbor

15.A school principle allows for student information to be accessed by a marketing company in exchange for goods and services for the school. The principle may have violated which law?
A) FERPA

16.The EU has developed a comprehensive concept of privacy, which is administered via a set of statutes known as __________.
A) data protection

17.A video rental store shares its customer database with a private investigator. The rental store may have violated which law?
A) VPPA

18.__________ requires that sites obtain parental permission, post a privacy policy detailing specifics concerning information collected from children, and describe how the children’s information will be used.
A) COPPA

19.A patient’s medical records are shared with a third party who is not a medical professional and without the patient’s approval. Which law may have been violated?
A) HIPAA

20.In the United States, the primary path to privacy is via opt-in.
A) False

Other Links:



Statistics Quiz




Networking Quiz




See other websites for quiz:



Check on QUIZLET




Check on CHEGG

One comment

Leave a Reply

Your email address will not be published. Required fields are marked *