Chapter 2 mgmt
Sworn testimony that certain facts are in the possession of the investigating officer and that they warrant the examination of specific items located at a specific place is known as an
Affidavit
Which of the following is the result of a US led international effort to reduce the impact of copyright, trademark, and privacy infringement, especially via the removal of technological copyright protection measures
DMCA
Which of the following is the study of the rightness and wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty or obligation based ethics
Deontological Ethics
Which of the following ethical framework is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right?
Descriptive Ethics
Which of the following is the best method for preventing an illegal or unethical activity
Deterrence
Which act requires organizations that retain health care information to use InfoSec mechanism to protect this information, as well as policies and procedures to maintain them
HIPPA
Which law addresses privacy and security concerns associated with the electronic transmission of PHI
Health Information Technology for Economic and Clinical Health Act
This collaborative support group began as a cooperative effort between the FBIs Cleveland field office and local technology professionals with a focus of protecting critical national infrastructure
InfraGard
Another key U.S. federal agency is _________ which is responsible for coordinating, directing, and performing highly specialized activities to protect U.S. information systems and produce foreign intelligence information
National Security Agency
_________ devices often pose special challenges to investigators since they can be configures to use advanced encryption and they can be wiped by the user even when the user is not present
Portable
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, us or operation of each federal computer systems
The Computer Security Act
Which act is a collection of statutes that regulate the interception of wire, electronic, and oral communications
The Electronic Communications Privacy Act of 1986
Which law extends protection to intellectual property, which includes words published in electronic formats?
U.S. copyright law
The most complex part of an investigation is usually ___________
analysis for potential evidentiary material
A more recent created area of law related to information security specifies a requirement for organization to notify affected parties when they have experiences a specific type of loss of information. This is commonly known as __________ law
breach
Which ethical standard is based on the notion that life in community yields a positive outcome for the individual, requiring each individual to contribute to that community?
common good
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis is known as _________
digital forensics
A process focused on the identification and locations of potential evidence related to specific legal action after it was collected through digital forensics is know as __________
e-discovery
Also known as "items of potential evidentiary value" , any information that could potentially support the organization's legal or policy-based case against a suspect is known as________
evidentiary material
Which of the following is NOT a requirement for laws and policies to deter illegal or unethical activity
fear of humiliation
The coherent application of methodical investigatory techniques to collect, preserve, and present evidence of crimes in a court is known as
forensics
IN digital forensics, all investigations follow the same basic methodology once permission to search and seize is received, beginning with __________
identifying relevant items for evidentiary value
Which of the following is NOT an origin used to categorize types of law?
international
Digital forensics can be used for two key purposes: ________ or _________
investigate allegations of digital malfeasance; perform root cause analysis
Any court can impose its authority over an individual or organization if it can establish which of the following?
jurisdiction
There are three general categories of unethical behavior that organizations and society should seek to eliminate. What is not one of them
malice
The penalties related to the National Information Infrastructure Protection Act of 1996 depends on whether the offense is judged to have been committed for one of the following reasons except which of the following? commercial advantage, financial gain, political advantage, furtherance of criminal act
political advantage
Which subset of civil law regulates the relationships among individuals and among individuals and organizations?
private
Which of the following is compensation for a wrong committed by an individual or organization?
restitution
Permission to search for evidentiary material at a specified location and/or seize items to return to the investigator's lab for examination is known as a
search warrant
When an incident violates civil or criminal law, it is the organizations responsibility to notify the proper authorities; selecting the appropriate law enforcement agency depends on __________
the type of crime committed
Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications? The code includes the canon: Provide diligent and competent service to principals.
(ISC)2