Legal Regulation ComplianceInvestigation1Word文档格式.docx
- 文档编号:17547643
- 上传时间:2022-12-07
- 格式:DOCX
- 页数:78
- 大小:70.75KB
Legal Regulation ComplianceInvestigation1Word文档格式.docx
《Legal Regulation ComplianceInvestigation1Word文档格式.docx》由会员分享,可在线阅读,更多相关《Legal Regulation ComplianceInvestigation1Word文档格式.docx(78页珍藏版)》请在冰豆网上搜索。
A.Source:
KRUTZ,RonaldL.&
VINES,RusselD.,TheCISSPPrepGuide:
MasteringtheTenDomainsofComputerSecurity,pages310.
Alsocheckout:
HARRIS,Shon,All-In-OneCISSPCertificationExamGuide,McGraw-Hill/Osborne,2002,chapter10:
Law,Investigation,andEthics(page678).
Contributors:
EricYandell,donmurdoch
Studyarea:
CISSPCBKdomain#9-Legal,Regulations,ComplianceandInvestigations
Coveredtopic:
Evidencetypesandadmissibility
Thisquestion©
Copyright2003–2006EricYandell,cccure.org.
2.Question:
1210|Difficulty:
Whatiscalledanexceptiontothesearchwarrantrequirementthatallowsanofficertoconductasearchwithouthavingthewarrantin-handifprobablecauseispresentanddestructionoftheevidenceisdeemedimminent?
EvidenceCircumstanceDoctrine
ExigentCircumstanceDoctrine
EvidenceofAdmissibilityDoctrine
ExigentProbableDoctrine
B.Source:
MasteringtheTenDomainsofComputerSecurity,2001,JohnWiley&
Sons,Page313.
NickMackovski,ChristianVezina
Evidencecollectionandpreservation
Copyright2003–2006NickMackovski,cccure.org.
3.Question:
1225|Difficulty:
2/5|Relevancy:
Lawenforcementagenciesmustgetawarranttosearchandseizeanindividual'
sproperty,asstatedinthe_____Amendment.Privatecitizensarenotsubjecttoprotectingtheseamendmentrulesofothersunlesstheyareactingaspoliceagents.
First.
Second.
Third.
Fourth.
D.Thecorrectansweris:
Fourth.
AmericancitizensareprotectedbytheFourthAmendmentagainstunlawfulsearchandseizure,solawenforcementagenciesmusthavecauseandrequestasearchwarrantfromajudgeorcourtbeforeconductingsuchasearch.
Lastmodified8/27/2007-J.Hajec
ThankstoBoWeeksforprovidinganupdatetotheresource.
Comment:
Resource:
HARRIS,Shon,All-In-OneCISSPCertificationExamGuide,ThirdEdition,McGraw-Hill/Osborne,2005(Page786)
.
Contributor:
NickMackovski
4.Question:
230|Difficulty:
5/5|Relevancy:
Whichofthefollowingprovidesfordatacollectionlimitations,thequalityofdata,specificationsofthepurposefordatacollection,limitationsofdatause,participationbytheindividualonwhomthedataisbeingcollected,andaccountabilityofthedatacontroller?
1980OrganizationforEconomicCooperationandDevelopment(OECD)Guidelines
1974U.S.PrivacyAct
1970U.S.FairCreditReportingAct
1973U.S.CodeofFairInformationPractices
MasteringtheTenDomainsofComputerSecurity,pages305-307.
EricYandell
Coveredtopics
(2):
Computerlaws,Evidencecollectionandpreservation
5.Question:
1209|Difficulty:
4/5|Relevancy:
Thecriteriaforevaluatingthelegalrequirementsforimplementingsafeguardsistoevaluatethecost(C)ofinstitutingtheprotectionversustheestimatedloss(L)resultingfromtheexploitationofthecorrespondingvulnerability.Therefore,alegalliabilityexistswhen:
C<
L
L-(residualrisk)
C>
ResidualRiskseemscan’tbevaluedatmonetaryterms.Checkthebook.
A.Ifthecostislowerthantheestimatedloss(C<
L),thenalegalliabilityexists.
Source:
Sons,Page315.
Legalliability
6.Question:
228|Difficulty:
Whichofthefollowingaddressesindustrialandcorporateespionage?
1996U.SEconomicandProtectionofProprietaryInformationAct
GenerallyAcceptedSystemsSecurityPrinciples(GASSP)
1980OrganizationforEconomicCooperationandDevelopment(OECD)
1970U.S.RacketeerInfluencedandCorruptOrganizationAct(RICO)
Computerlaws
7.Question:
1360|Difficulty:
Whywouldamemorydumpbeadmissibleasevidenceincourt?
Becauseitisusedtodemonstratethetruthofthecontents.
Becauseitisusedtoidentifythestateofthesystem.
Becausethestateofthememorycannotbeusedasevidence.
Becauseoftheexclusionaryrule.
B.Amemorydumpcanbeadmittedasevidenceifitactsmerelyasastatementoffact.Asystemdumpisnotconsideredhearsaybecauseitisusedtoidentifythestateofthesystem,notthetruthofthecontents.Theexclusionaryrulementionsthatevidencemustbegatheredlegallyoritcan'
tbeused.Thischoiceisadistracter.
ANDRESS,Mandy,ExamCramCISSP,Coriolis,2001,Chapter10:
Law,Investigation,andEthics(page187).
Lastmodified07/02/2007,RonHehemann
Rememberthisisareallivesnapshotofthesystem
ChristianVezina
Copyright2003–2006ChristianVezina,cccure.org.
8.Question:
1520|Difficulty:
WhichofthefollowingEuropeanUnion(EU)principlespertainingtotheprotectionofinformationonprivateindividualsisincorrect?
Individualshavetherighttocorrecterrorscontainedintheirpersonaldata.
Datashouldbeusedonlyforthepurposesforwhichitwascollected,andonlyforareasonableperiodoftime.
Transmissionofpersonalinformationtootherorganizationsorindividualsisprohibited.
Individualsareentitledtoreceiveareportontheinformationthatisheldaboutthem.
C.Informationcollectedaboutanindividualcannotbedisclosedtootherorganizationsorindividualsunlessauthorizedbylaworbyconsentoftheindividual.Also,transmissionofpersonalinformationtolocationswhere"
equivalent"
personaldataprotectioncannotbeassuredisprohibited.
MasteringtheTenDomainsofComputerSecurity,JohnWiley&
Sons,2001,Chapter9:
Law,Investigation,andEthics(page302).
Protectionofpersonalinformation
9.Question:
716|Difficulty:
2/3
WhichofthefollowingmadetheftNOlongerrestrictedtophysicalconstraints?
TheElectronicEspionageActof1996.
TheGrammLeachBlileyActof1999.
TheComputerSecurityActof1987.
TheFederalPrivacyActof1974.
A.Thecorrectansweris'
TheElectronicEspionageActof1996'
madetheftnolongerrestrictedtophysicalconstraints.
Theotheranswersareincorrectbecause:
'
TheGrammLeachBlileyActof1999'
isincorrectasitdealswithfinancialinstitutions.
TheComputerSecurityActof1987'
isincorrectbecauseitdealswithfederalagencies.
TheFederalPrivacyActof1974'
isincorrectbecauseitalsodealswithfederalagencies.
HARRIS,Shon,All-In-OneCISSPCertificationExamGuide,McGraw-Hill/Osborne,2002,Chapter10:
Law,Investigation,andEthics(page691).
LastModified-18/09/07-SGKrishnan
TheElectronicEspionageActof1996madetheftnolongerrestrictedtophysicalconstraints.Assetscouldalsobeviewedasintangibleobjectsthatcanalsobestolenordisclosedordisclosedviatechnologymeans.TheGrammLeachBlileyActdealswithfinancialinstitutionsandtheComputerSecurityActandFederalPrivacyActdealwithfederalagencies.
10.Question:
715|Difficulty:
Whichofthefollowingoutlinedhowseniormanagementareresponsibleforthecomputerandinformationsecuritydecisionsthattheymakeandwhatactuallytookplacewithintheirorganizations?
TheFederalSentencingGuidelinesof1991.
TheEconomicEspionageActof1996.
TheComputerFraudandAbuseActof1986.
B.In1991,U.S.FederalSentencingGuidelinesweredevelopedtoprovidejudgeswithcoursesofactionindealingwithwhitecollarc
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Legal Regulation Compliance Investigation1
![提示](https://static.bdocx.com/images/bang_tan.gif)
链接地址:https://www.bdocx.com/doc/17547643.html