8 - Legal, Regulations, Investigations and Compliance Flashcards
(125 cards)
- Which RFC contains the Internet Activity Board’s “Ethics and the Internet” documentation? a. RFC 1918b. RFC 1394c. RFC 1024d. RFC 1087
D: RFC 1087 contains the Internet Activity Board’s “Ethics and the Internet” documentation.
- Which of the following is not defined as unethical and unacceptable activity by Internet Activity Board’s “Ethics and the Internet” documentation?a. Soliciting for non-profit organization donationsb. Wasting resources (people, capacity, computer) through such actionsc. Destroying the integrity of computer-based informationd. Compromising the privacy of users
A: This is not listed or defined as unethical and unacceptable activity by RFC 1087.
- The theft of small amounts of information from many sources to compile or infer data about something private or classified is known as?a. Masqueradingb. The Salami techniquec. Data diddlingd. Espionage
B: The theft of small amounts of information from many sources to compile or infer data about something private or classified is known as the Salami technique.
- Which of the following is not technically a crime according to the law?a. espionageb. fraudc. piracyd. resource waste
D: Resource waste is an inappropriate activity but not an actual crime.
- Which of the following defined the unauthorized possession of information without the intent to profit from the information as a crime?a. 1991 U.S. Federal Sentencing Guidelinesb. U.S. Computer Fraud and Abuse Actc. U.S. Privacy Act 1974d. U.S. National Information Infrastructure Protection Act 1996
A: The 1991 U.S. Federal Sentencing Guidelines defined the unauthorized possession of information without the intent to profit from the information as a crime.
- Evidence should be all but which of the following in order to be used in court?a. Reliableb. Sufficientc. Relevantd. Permissible
B: Evidence need not be sufficient.
- Which of the following is not an element or aspect of the ISC(2) code of ethics?a. CISSP certification holders are required by law to uphold the ISC(2) code of ethicsb. CISSP certification holders should adhere to the highest ethical standards of behaviorc. A condition of CISSP certification is adherence to the ISC(2) code of ethics.d. Protect society, the commonwealth, and the infrastructure
A: This is not element or aspect of the ISC(2) code of ethics, the code is not enforceable by law.
- Violation of the ISC(2) code of ethics can result in?a. Arrestb. Revocation of certificationc. Financial penaltiesd. Community service hours
B: A consequence of violating the ISC(2) code of ethics is revocation of certification.
- Which of the following is not directly specified in the cannons of the ISC(2) code of ethics?a. Act honorably, honestly, justly, responsibly, and legallyb. Provide diligent and competent service to principals.c. Don’t write malicious code such as virusesd. Advance and protect the profession
C: This is not addressed in the cannons of the ISC(2) code of ethics.
- The crime of impersonation or spoofing is also known as?a. Spammingb. Data diddlingc. Masqueradingd. Social engineering
C: Masquerading is another name for the crime of impersonation or spoofing.
- Unauthorized modification of data is known as?a. The salami technique b. Spoofingc. Malicious coded. Data diddling
D: Data diddling is the act of unauthorized modification of data.
- TEMPEST is concerned with?a. Emanation eavesdroppingb. Distributed Denial of Service attacks.c. Password theftd. Dumpster diving
A: TEMPEST is concerned with emanation eavesdropping.
- The act of extracting information from discarded materials is known as?a. Fraudb. Dumpster divingc. Information warfared. Superzapping
B: The act of extracting information from discarded materials is known as
- Which of the following is not supported by the ISC2’s CISSP code of ethics? a. promote understanding of securityb. provide competent servicec. do not disclose confidential information from clientsd. report crimes to ISC2
D: The ISC2’s CISSP code of ethics indicates that knowledge of crimes should be appropriately reported. Appropriately reporting crimes would be to inform the management of the organization and/or law enforcement. Informing ISC2 is not appropriate.
- Which of the following is not considered a violation of computer ethics?a. working overtime on an IT projectb. browsing files on the file serverc. using proprietary software without compensationd. employing another’s intellectual property without acknowledgement
A: It is not a violation of computer ethics to work overtime.
- Which of the following is not defined as unacceptable and inappropriate by the Internet Activities Board of Ethics and the Internet?a. seeking to gain unauthorized access to resourcesb. conducting commercial activities over the Internetc. destroying the integrity of computer stored informationd. wasting resources
B: Conducting commercial activities over the Internet is not defined as an unacceptable and inappropriate activity as defined by the Internet Activities Board of Ethics and the Internet.
- Which of the following is not a valid means to identify or label computer evidence?a. writing on printouts with permanent markersb. recording serial numbersc. writing a contents and ID tag file to a hard drived. photographing the contents displayed on the monitor
C: Writing a file to the hard drive may alter the evidence and therefore is an invalid means to label evidence.
- What type of evidence proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses?a. Hearsay evidenceb. Circumstantial evidencec. Secondary evidenced. Direct evidence
D: Direct evidence proves or disproves a specific act through oral testimony based on information gathered through the witness’s five senses.
- Which of the following is not an element in the ISC2’s code of ethics that all CISSP candidates must adhere to?a. conduct themselves with high standards of moral, ethical, and legal behaviorb. do not commit any unlawful actc. do not write malicious coded. report all discovered unlawful activity
C: The actual act of authoring malicious code is not a violation of the ISC2’s code of ethics. However, allowing that malicious code to affect systems is a violation.
- Which of the following is not a computer crime?a. social engineeringb. surfing pornographic Web sitesc. password sniffingd. spoofing IP addresses
B: Surfing pornographic Web sites is inappropriate in most business environments and often grounds for termination, but it is not a crime.
- Which of the following is not a crime against a computer?a. intercepting wireless network communicationsb. installing software that has not been properly purchasedc. causing a blackout of the local power grid by damaging a power stationd. testing an intrusion script against a competitor’s Web site
C: Causing a blackout of the local power grid by damaging a power station cannot be considered a crime against a computer.
- Which of these computer crimes is not like the others?a. spoofingb. Trojan horsec. masqueradingd. data diddling
D: Data diddling is the alteration of data, not the use of information to pretend to be something else.
- Which of the following is not a true statement according to the Generally Accepted Systems Security Principles (GASSP)?a. computer security supports the mission of an organizationb. computer security should be cost effectivec. computer security is not restrained by societyd. computer security should be periodically reassessed
C: Computer security is restrained by society according to GASSP.
- The U.S. Department of Health, Education, and Welfare Code of Fair Information Practices requires which of the following?a. people must be able to remove any information about themselves from databases containing personal datab. organizations maintaining personal data do not need to ensure that data isn’t misusedc. data stored about people must be timelyd. the existence of systems that maintain records of a personal nature cannot remain secret
D: The U.S. Department of Health, Education, and Welfare Code of Fair Information Practices requires that the existence of systems that maintain records of a personal nature cannot remain secret.