Chapter 24 Quiz

__________ is the unauthorized entry into a computer system via any means. A. Computer trespass

A law that is passed by a legislative branch of government is known as a(n) __________. A. statutory law

Canada was an early leader in the use of digital signatures. A. True

Check fraud is an example of computer-based fraud that deals with Internet advertising. A. False

Computer trespass is treated as a crime only in the United States. A. False

Export control rules for encryption technologies fall under the Wassenaar Arrangement. A. True

In categorizing computer crimes, the differentiating factor is in how the computer is specifically involved from the criminal’s point of view. A. True

Law that is based on previous events or precedents is known as __________. A. common law

Laws and regulations that are created by government-sponsored agencies such as the EPA, the FAA, and the FCC are known as __________. A. administrative laws

One characteristic of the USA PATRIOT Act of 2001 is that it __________. A. extends the tap and trace provisions of existing wiretap statutes to the Internet

The CAN-SPAM Act allows unsolicited commercial e-mail as long as there is an unsubscribe link, the content is not deceptive, and the sender does not use harvested emails. A. True

The Digital Millennium Copyright Act (DMCA) protects the rights of recording artists and the music industry. A. True

The Electronic Communications Privacy Act (ECPA) of 1986 __________. A. addresses a myriad of legal privacy issues that resulted from the increasing use of computers and other technology specific to telecommunications

The Gramm-Leach-Bliley Act is a major piece of legislation that __________. A. affects the financial industry and contains significant privacy provisions for individuals

The low risk of being caught is one of the reasons that criminals are turning to computer crime. A. True

The PATRIOT Act permits the Justice Department to proceed with its rollout of the Carnival program, an eavesdropping program for the Internet. A. False

Two major laws that provide wide-sweeping tools for law enforcement to convict people who hack into computers or use them to steal information are the SOX and the CFAA. A. False

What is the Convention on Cybercrime? A. the first international treaty on crimes committed via the Internet and other computer networks

Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature? A. Computer Fraud and Abuse Act

Which law regulates unsolicited commercial e-mail? A. CAN-SPAM Act

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *