MGMT chapter 2 quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

`this collaborative support group began as a cooperative effort between the FBI's Cleveland field office and local technology professionals with a focus of protecting critical national infrastructure

infragard

which of the following is NOT an origin used to categorize types of law

intentional

digital forensics can be used for two key purposes

investigate allegations of digital malfeasance; perform root cause analysis

any court can impose its authority over an individual or organization if it can establish which of the following

jurisdiction

another key US federal agency is ___ which is responsible for coordinating directing, and performing highly specialized activities to protect US information systems and produce foreign intelligence information

national security agency

permission to search for evidentiary material at a specified location and/or to seize items to return to the investigation's lab for examination is known as

search warrant

which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federal system

the computer security act

sworn testimony that certain facts are in the possession of the investigating officer and that they warrant the examination of specific items located at a specific place is known as

affidavit

the most complex part of an investigation is usually

analysis for potential evidentiary material

which ethical standard is based on the notion that life in community yields a positive outcome for the individuals, requiring each individual to contribute to that community

common good

which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty - or obligation- based ethics

deontological ethics

a process focused on the identification and location of potential evidence related to a specific legal action after it was collected through digital forensics is known as

e-discovery

also known as "items of potential evidentiary value "any information that could potentially support the organization's legal or policy based case against a suspect is known

evidentiary material

the penalties for offenses related to the national information infrastructure protection act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following

for political advantage

which law addresses privacy and security concerns associated with the electronic transmission of PHI

health information technology for economic and clinical health act


Ensembles d'études connexes

COSC 254 Chapter 4, Nichols exam questions

View Set

Business Law, Chapter 32, Exam 3

View Set

Chapter 10: Water-Soluble Vitamins

View Set

Rules of radiation protection for the operator include all of the following except

View Set

Chapter 7 - Cultural Competence: Common Grounds for Partnerships in Health Care

View Set