__________ is the unauthorized entry into a computer system via any means. A. Computer trespass
A law that is passed by a legislative branch of government is known as a(n) __________. A. statutory law
Canada was an early leader in the use of digital signatures. A. True
Check fraud is an example of computer-based fraud that deals with Internet advertising. A. False
Computer trespass is treated as a crime only in the United States. A. False
Export control rules for encryption technologies fall under the Wassenaar Arrangement. A. True
In categorizing computer crimes, the differentiating factor is in how the computer is specifically involved from the criminal’s point of view. A. True
Law that is based on previous events or precedents is known as __________. A. common law
Laws and regulations that are created by government-sponsored agencies such as the EPA, the FAA, and the FCC are known as __________. A. administrative laws
One characteristic of the USA PATRIOT Act of 2001 is that it __________. A. extends the tap and trace provisions of existing wiretap statutes to the Internet
The CAN-SPAM Act allows unsolicited commercial e-mail as long as there is an unsubscribe link, the content is not deceptive, and the sender does not use harvested emails. A. True
The Digital Millennium Copyright Act (DMCA) protects the rights of recording artists and the music industry. A. True
The Electronic Communications Privacy Act (ECPA) of 1986 __________. A. addresses a myriad of legal privacy issues that resulted from the increasing use of computers and other technology specific to telecommunications
The Gramm-Leach-Bliley Act is a major piece of legislation that __________. A. affects the financial industry and contains significant privacy provisions for individuals
The low risk of being caught is one of the reasons that criminals are turning to computer crime. A. True
The PATRIOT Act permits the Justice Department to proceed with its rollout of the Carnival program, an eavesdropping program for the Internet. A. False
Two major laws that provide wide-sweeping tools for law enforcement to convict people who hack into computers or use them to steal information are the SOX and the CFAA. A. False
What is the Convention on Cybercrime? A. the first international treaty on crimes committed via the Internet and other computer networks
Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce, or to use a computer in a crime that is interstate in nature? A. Computer Fraud and Abuse Act
Which law regulates unsolicited commercial e-mail? A. CAN-SPAM Act
Other Links:
See other websites for quiz:
Check on QUIZLET