Chapter 2 mgmt

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Sworn testimony that certain facts are in the possession of the investigating officer and that they warrant the examination of specific items located at a specific place is known as an

Affidavit

Which of the following is the result of a US led international effort to reduce the impact of copyright, trademark, and privacy infringement, especially via the removal of technological copyright protection measures

DMCA

Which of the following is the study of the rightness and wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty or obligation based ethics

Deontological Ethics

Which of the following ethical framework is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right?

Descriptive Ethics

Which of the following is the best method for preventing an illegal or unethical activity

Deterrence

Which act requires organizations that retain health care information to use InfoSec mechanism to protect this information, as well as policies and procedures to maintain them

HIPPA

Which law addresses privacy and security concerns associated with the electronic transmission of PHI

Health Information Technology for Economic and Clinical Health Act

This collaborative support group began as a cooperative effort between the FBIs Cleveland field office and local technology professionals with a focus of protecting critical national infrastructure

InfraGard

Another key U.S. federal agency is _________ which is responsible for coordinating, directing, and performing highly specialized activities to protect U.S. information systems and produce foreign intelligence information

National Security Agency

_________ devices often pose special challenges to investigators since they can be configures to use advanced encryption and they can be wiped by the user even when the user is not present

Portable

Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, us or operation of each federal computer systems

The Computer Security Act

Which act is a collection of statutes that regulate the interception of wire, electronic, and oral communications

The Electronic Communications Privacy Act of 1986

Which law extends protection to intellectual property, which includes words published in electronic formats?

U.S. copyright law

The most complex part of an investigation is usually ___________

analysis for potential evidentiary material

A more recent created area of law related to information security specifies a requirement for organization to notify affected parties when they have experiences a specific type of loss of information. This is commonly known as __________ law

breach

Which ethical standard is based on the notion that life in community yields a positive outcome for the individual, requiring each individual to contribute to that community?

common good

Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis is known as _________

digital forensics

A process focused on the identification and locations of potential evidence related to specific legal action after it was collected through digital forensics is know as __________

e-discovery

Also known as "items of potential evidentiary value" , any information that could potentially support the organization's legal or policy-based case against a suspect is known as________

evidentiary material

Which of the following is NOT a requirement for laws and policies to deter illegal or unethical activity

fear of humiliation

The coherent application of methodical investigatory techniques to collect, preserve, and present evidence of crimes in a court is known as

forensics

IN digital forensics, all investigations follow the same basic methodology once permission to search and seize is received, beginning with __________

identifying relevant items for evidentiary value

Which of the following is NOT an origin used to categorize types of law?

international

Digital forensics can be used for two key purposes: ________ or _________

investigate allegations of digital malfeasance; perform root cause analysis

Any court can impose its authority over an individual or organization if it can establish which of the following?

jurisdiction

There are three general categories of unethical behavior that organizations and society should seek to eliminate. What is not one of them

malice

The penalties related to the National Information Infrastructure Protection Act of 1996 depends on whether the offense is judged to have been committed for one of the following reasons except which of the following? commercial advantage, financial gain, political advantage, furtherance of criminal act

political advantage

Which subset of civil law regulates the relationships among individuals and among individuals and organizations?

private

Which of the following is compensation for a wrong committed by an individual or organization?

restitution

Permission to search for evidentiary material at a specified location and/or seize items to return to the investigator's lab for examination is known as a

search warrant

When an incident violates civil or criminal law, it is the organizations responsibility to notify the proper authorities; selecting the appropriate law enforcement agency depends on __________

the type of crime committed

Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications? The code includes the canon: Provide diligent and competent service to principals.

(ISC)2


Set pelajaran terkait

Chapter 8: Life Insurance Premiums & Proceeds

View Set

Chapter 5: Planning : Management

View Set

Sociology - Chapter 16 - Collective Behavior, Social Movements, and Social Change

View Set

Unit 16: Individual Retirement Accounts

View Set

Quarter 4 Bells Supreme Court Cases

View Set

Med-Surg Ch 22: Care of Patients With Head and Spinal Cord Injuries

View Set