404 ◾  Official (ISC)
2
® Guide to the ISSMP® CBK®
© 2011 by Taylor & Francis Group, LLC
the person has several photos of children on a nude beach, but none of them
involves sex or focuses on the childs genitalia. Which of the following is true?
a. It is child pornography, and the computer user can be charged with pos-
session of child pornography.
b. It is child pornography, and the computer user can be charged or
disciplined.
c. It is not child pornography, and the computer user can be disciplined.
d. It is not child pornography, and the computer user cannot be charged or
disciplined.
7. Which of the following methods of distributing contraband data doesn’t
require les being stored on a server on the Internet?
a. E-mail
b. Mailing lists
c. Peer to peer
d. Newsgroups
8. Tracing violations or attempted violations of system security to the user
responsible is a function of what?
a. Authentication
b. Access management
c. Integrity checking
d. Accountability
9. Why is a conict of interest considered troubling from the standpoint of
fraud prevention?
a. A conict of interest violates canons of professional responsibility.
b. A conict of interest is obviously unethical and causes waste.
c. A conict of interest can be a sign of fraud, if not a source of it.
d. A conict of interest violates federal law and is therefore illegal.
10. e penalties that can be sanctioned to the losing party in a civil case can include
a. Probation
b. Community service
c. Fines
d. Imprisonment
11. Evidence needs to be one of the following in order to be deemed as admissible
in a court of law:
a. Conclusive
b. Incontrovertible
c. Irrefutable
d. Relevant
12. RFC 1087 sets the IAB “Ethics and the Internetcategorization of unethical
actions. Which of the following is NOT considered as unethical under the IAB?
a. Downloading pornography
b. Compromising user privacy without authorization
Law Investigation, Forensics, and Ethics ◾  405
© 2011 by Taylor & Francis Group, LLC
c. Taking resources such as stationary and using equipment for personal uses
d. Seeking to gain unauthorized access to resources
13. What is an evidence-gathering technique that occurs when a law enforce-
ment ocer entices a party into enacting a criminal oense they may not
have otherwise committed with the aim of capturing the person in a sting”
operation; is this considered legal or illegal?
a. Enticement/legal
b. Coercion/legal
c. Entrapment/illegal
d. Enticement/illegal
14. Which expression is used to describe the process where a party is provided
with sucient temptation such that they may hand over evidence of a crime
that the individual has committed?
a. Enticement
b. Coercion
c. Entrapment
d. Encouragement
15. What penalties does the CFAA hold for people who create and release
malware?
a. e CFAA has both civil and criminal sanctions.
b. e CFAA has criminal sanctions.
c. e CFAA has civil sanctions.
d. e CFAA does not incorporate malware and is targeted at fraud such as
phishing and nancial fraud.
16. Which of the following is not considered to be intellectual property?
a. Patents, servicemarks, and trademarks
b. Plant grower’s rights
c. Computer hardware
d. Trade secrets
17. Which term best describes the situation where an individual attacks (hacks) a
computer system with the motive of curiosity or the thrill of seeing what is there?
a. Scoping attack
b. Digital thrill seeking
c. Recon attacks
d. Phishing
18. e Fourth Amendment to the U.S. Constitution sets the standard for what
action?
a. Free speech
b. Commercial transactions and interstate commerce
c. Individual privacy
d. Government searches or seizure
406 ◾  Ofcial (ISC)
2
® Guide to the ISSMP® CBK®
© 2011 by Taylor & Francis Group, LLC
19. Why is prevention alone NOT sucient to protect a system from attackers?
a. Even the nest preventive measures experience failures.
b. e maintenance of preventive measures is labor intensive.
c. It is hard to put preventive measures into operation.
d. Prevention by itself is an expensive alternative.
20. A set of principles that is derived from a cultural or religious authority and
standards is known as
a. Policy
b. Law
c. Guidelines
d. A moral code
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.15.99