This preview shows page 1. Sign up to view the full content.
Unformatted text preview: isks and other media that are copies of the original evidence are considered
A. Primary evidence
B. Reliable and sufficient evidence
C. Hearsay evidence
D. Conclusive evidence ch10.indd 916 12/4/2009 11:39:15 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 Chapter 10: Legal, Regulations, Compliance, and Investigations 917
20. If a company does not inform employees that they may be monitored and
does not have a policy stating how monitoring should take place, what should
a company do?
A. Don’t monitor employees in any fashion.
B. Monitor during off-hours and slow times.
C. Obtain a search warrant before monitoring an employee.
D. Monitor anyway—they are covered by two laws allowing them to do this.
21. What is one reason why successfully prosecuting computer crimes is so
A. There is no way to capture electrical data reliably.
B. The evidence in computer cases does not follow best evidence directives.
C. These crimes do not always fall into the traditional criminal activity
D. Wiretapping is hard to do legally.
22. When can executives be charged with negligence?
A. If they follow the transborder laws
B. If they do not properly report and prosecute attackers
C. If they properly inform users that they may be monitored
D. If they do not practice due care when protecting resources
23. To better deal with computer crime, several legislative bodies have taken what
steps in their strategy?
A. Expanded several privacy laws
B. Broadened the definition of property to include data
C. Required corporations to have computer crime insurance
D. Redefined transborder issues
24. Many privacy laws dictate which of the following rules?
A. Individuals have a right to remove any data they do not want others to know.
B. Agencies do not need to ensure that the data is accurate.
C. Agencies need to allow all government agencies access to the data.
D. Agencies cannot use collected data for a purpose different from what it was
25. Which of the following is not true about dumpster diving?
A. It is legal.
B. It is illegal.
C. It is a breach of physical security.
D. It is gathering data from places peo...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12