Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?1. Communications Act 2. Economic Espionage Act 3. Computer Security Act 4. Financial Services Modernization Act
Criminal or unethical ____ goes to the state of mind of the individual performing the act.1. accident 2. intent 3. attitude 4. ignorance
Laws and policies and their associated penalties only deter if which of the following conditions is present?1. Fear of penalty 2. All of the above 3. Probability of being caught 4. Probability of penalty being administered
____ defines stiffer penalties for prosecution of terrorist crimes.
1. Sarbanes-Oxley Act 2. U.S.A. Patriot Act 3. Economic Espionage Act 4. Gramm-Leach-Bliley Act
According to the National Information Infrastructure Protection Act of 1996, the severity of penalties for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except:
1. In furtherance of a criminal act 2. For purposes of commercial advantage 3. To harass 4. For private financial gain
The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.1. Theft 2. Violence 3. Usage 4. Fraud
The National Information Infrastructure Protection Act of 1996 modified which Act?
1. Computer Fraud and Abuse Act 2. USA PATRIOT Improvement and Reauthorization Act 3. USA PATRIOT Act 4. Computer Security Act
Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?1. United States 2. Sweden 3. Singapore 4. Australia
The Council of Europe adopted the European Council Cyber-Crime Convention in ____.1. 2001 2. 1976 3. 1998 4. 1986