Вы находитесь на странице: 1из 1

1._____________ is the unauthorized entry into a computer system via any means.

Computer trespass
2.The _______________ was designed to enable public access to US government reco
rds, where public includes the press which acts on behalf of the public to obtai
n information.
Freedom of Information Act
3.Which of the following is a standard that provides guidance on the elements of
a credit card transaction that needs protection and the level of expected prote
ction?
PCI DSS
4.Which law makes it a crime to knowingly access a computer that is either consi
dered a government computer or used in interstate commerce, or to use a computer
in a crime that is interstate in nature?
Computer Fraud and Abuse Act
5._______________ is a set of elements that can lead to the specific identity of
a person.
Personally identifiable information
6.Which of the following countries has a long reputation of poor privacy practic
es?
China
7.What is the Convention on Cybercrime?
The first international treaty on crimes committed via the Internet and other co
mputer networks
8.The Wassenaar Arrangement can be described as which of the following?
An international arrangement on export controls for conventional arms as well as
dual-use goods and technologies
9.The electronic signatures in the Global and National Commerce Act
Implement the principle that a signature, contract, or other record may not be d
enied legal effect, validity, or enforceability solely because it is electronic
form
10.A school principle allows for student information to be accessed by a marketi
ng company in exchange for goods and services for the school. The principle may
have violated which law?
FERPA
11.A patient's medical records are shared with a third party who is not a medica
l professional and without the patient's approval. Which law may have been viola
ted?
HIPAA
12.A(n) _______________ is a structured approach to determining the gap between
desired privacy performance and actual privacy performance.
privacy impact assessment
13.What is the law that overhauled the financial accounting standards for public
ly traded firms in the United States?
Sarbanes-Oxley Act
14.The law that regulates unsolicited commercial e-mail is the
Stored Communications Act INCORRECT
15.The Electronic Communications Privacy Act (ECPA) of 1986
Addresses a myriad of legal privacy issues that were resulting from the increasi
ng use of computers and other technology specific to telecommunications
16.The EU has developed a comprehensive concept of privacy, which is administere
d via a set of statutes known as what?
Data protection
17.What is the Gramm-Leach-Bliley Act?
A major piece of legislation affecting the financial industry and containing sig
nificant privacy provisions for individuals
18.Which law makes it illegal to develop, produce, and trade any device or mecha
nism designed to circumvent technological controls used in copy protection?
Digital Millennium Copyright Act