Computer Fraud and Abuse Act correct answers In a situation where phishing attackers attempt to steal personal information, which of the following federal acts can be used to prosecute such a crime?
Identity Theft and Assumption Deterrence Act correct answers The _______________ makes identify t...
ITN 267 Final || All Answers Are Correct 100%.
Computer Fraud and Abuse Act correct answers In a situation where phishing attackers attempt
to steal personal information, which of the following federal acts can be used to prosecute such a
crime?
Identity Theft and Assumption Deterrence Act correct answers The _______________ makes
identify theft a federal crime.
subject matter correct answers The power of a court to decide certain types of cases is
______________________ jurisdiction
Substantive correct answers ______________________ criminal law defines the conduct that
constitutes a crime and establishes penalties.
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) correct
answers _______________________ covers unsolicited commercial e-mail messages and
requires commercial e-mail senders to meet certain requirements
The government bears the burden of proving that the defendant violated the law correct answers
Which statement is true about the burden of proof in a criminal case?
Sixth correct answers Which amendment to the U.S. Constitution guarantees defendants a speedy
trial?
The Computer Fraud and Abuse Act of 1984 correct answers What is the first piece of federal
legislation that identified computer crimes as distinct offenses
Tort correct answers _______________ law uses the reasonable person standard to determine
whether a person acted appropriately
trade secret correct answers A ______________ protects the formulas, processes, methods, and
information that give a business a competitive edge
Intellectual property law correct answers _____________________ is the area of law that
protects a person's creative ideas, inventions, and innovations
Trademarks correct answers _____________ are used to protect words, logos, and symbols that
identify a product or services
patents correct answers Which of the following has the longest period of protection?
Patents correct answers Unlike ______________, trade secrets aren't registered. A person or
business doesn't have to meet any registration or procedural formalities for protection
, cybersquatting correct answers The bad faith registration of a domain name that's a registered
trademark or trade name of another entity is referred to as
intellectual property correct answers Patents, trademarks, and copyrights are all types of
_________________
it must be distinctive correct answers A trademark has two criteria: 1) it must be used in
interstate commerce and 2) _____________________
Digital Millennium Copyright Act correct answers In 1998, Congress passed the
_________________________.This law helps protect copyrights in the multimedia world. It also
contains provisions that help insulate Internet service providers from the actions of their
customers
Design correct answers _______________ patents protect the visual appearance of a product
Federal Information Security Management Act (FISMA) correct answers Congress created the
_____________ in response to the September 11, 2001, terrorist attacks.
National Institute of Standards and Technology (NIST) correct answers FISMA requires the
Department of Commerce to create information security standards and guidelines. To which of
the following organizations did the Department of Commerce delegate this responsibility?
Subordinate plans correct answers __________________________ must be in place for securing
networks, facilities, and systems or groups of IT systems. They are intended for technologies or
system components that are a part of the larger information security program.
Export control regulations correct answers __________________ restrict the transmission of
certain types of information to non-U.S. citizens or non-permanent residents who are located in
the United State
Office of Foreign Assets Control (OFAC) correct answers The ________________ enforces
trade sanctions and embargoes and prohibits trade with certain people in other countries.
Privacy Act of 1974 correct answers The ______________________ was created by Congress to
protect data collected by the governmen
Office of Foreign Assets Control (OFAC) correct answers The
__________________________enforces trade sanctions and embargoes
Computer Security Act (CSA) correct answers What was the first federal law to address federal
computer security?
maximum requirements for encryption correct answers After the ChoicePoint breach, 46 states,
including the District of Columbia, have created breach notification laws. Although, most states
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.59. You're not tied to anything after your purchase.