404 ◾ Official (ISC)
2
® Guide to the ISSMP® CBK®
© 2011 by Taylor & Francis Group, LLC
the person has several photos of children on a nude beach, but none of them
involves sex or focuses on the child’s genitalia. Which of the following is true?
a. It is child pornography, and the computer user can be charged with pos-
session of child pornography.
b. It is child pornography, and the computer user can be charged or
disciplined.
c. It is not child pornography, and the computer user can be disciplined.
d. It is not child pornography, and the computer user cannot be charged or
disciplined.
7. Which of the following methods of distributing contraband data doesn’t
require les being stored on a server on the Internet?
a. E-mail
b. Mailing lists
c. Peer to peer
d. Newsgroups
8. Tracing violations or attempted violations of system security to the user
responsible is a function of what?
a. Authentication
b. Access management
c. Integrity checking
d. Accountability
9. Why is a conict of interest considered troubling from the standpoint of
fraud prevention?
a. A conict of interest violates canons of professional responsibility.
b. A conict of interest is obviously unethical and causes waste.
c. A conict of interest can be a sign of fraud, if not a source of it.
d. A conict of interest violates federal law and is therefore illegal.
10. e penalties that can be sanctioned to the losing party in a civil case can include
a. Probation
b. Community service
c. Fines
d. Imprisonment
11. Evidence needs to be one of the following in order to be deemed as admissible
in a court of law:
a. Conclusive
b. Incontrovertible
c. Irrefutable
d. Relevant
12. RFC 1087 sets the IAB “Ethics and the Internet” categorization of unethical
actions. Which of the following is NOT considered as unethical under the IAB?
a. Downloading pornography
b. Compromising user privacy without authorization