Filters
Question type

Study Flashcards

The exacting process of computer forensic examination includes _____.


A) read protecting the device
B) connecting the computer to a network
C) imaging the hard drive
D) deconstructing the hard drive

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Neither Title III of the Omnibus Crime Control and Safe Streets Act of 1968 nor the Fourth Amendment requires law enforcement to _____.


A) obtain a judicial order to intercept wire, oral, or electronic communications
B) obtain judicial authorization to covertly enter the premises to install a listening device
C) first receive administrative authorization to apply for an interception order
D) conduct themselves in a way that minimizes the interception of communications not subject to the interception order

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The Foreign Intelligence Surveillance Act does not require a showing of probable cause to believe that a crime has been or is being committed.

A) True
B) False

Correct Answer

verifed

verified

Dropbox, SkyDrive and SugarSync are companies that offer remote computing services, where one can digitally store their information "in the __________ ."

Correct Answer

verifed

verified

What specific legislation authorizes courts to conduct closed reviews of surveillance materials?


A) The Foreign Intelligence Surveillance Act (FISA)
B) Stored Communications Act (SCA)
C) Electronic communications Privacy Act (ECPA)
D) Freedom of Information Act (FOIA)

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Explain the jurisdiction and procedures of the Foreign Intelligence Surveillance Court (FISC).

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The Foreign Intelligence Surveillance Co...

View Answer

A _____ wiretap allows for interception of a particular suspect's communications wherever they are made, dispensing with the normal requirement that interceptions be limited to a fixed location.


A) geographical
B) roving
C) non-specific
D) roaming

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Assess the requirements that some courts impose on applications for search warrants for electronically stored information. Identify the limitations in place and explain the rationale of these limitations.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

When it comes to applications for search...

View Answer

Briefly describe what the Foreign Intelligence Surveillance Act (FISA) is and does.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The Foreign Intelligence Surveillance Ac...

View Answer

Under the _____ exception, an employee or agent of a communications service entity may intercept and disclose communications to protect the rights or property of the provider as part of the ordinary course of business.


A) computer trespasser
B) public access
C) provider
D) exigent circumstances

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In Olmstead v. United States (1928) , the Court held that wiretapping of telephone conversations _____.


A) is covered by the Fourth Amendment, but does not violate it
B) was not covered by the Fourth Amendment
C) is covered by the Fourth Amendment, and is a violation of it
D) was only a partial violation of the Fourth Amendment

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Title III of the Wiretap Act does not cover video surveillance using video cameras that record only images and not aural communications.

A) True
B) False

Correct Answer

verifed

verified

Searches and seizures concerning foreign intelligence and antiterrorism efforts are authorized and regulated by the Foreign Intelligence and Racketeering Act (FIRA).

A) True
B) False

Correct Answer

verifed

verified

The case of Dalia v. United States ruled that a judicial order to place an eavesdropping device by law enforcement in a business or residence need not have a separate order specifically authorizing the __________ entry to install the device.

Correct Answer

verifed

verified

Title III of the Omnibus Crime Control and Safe Streets Act of 1968 _____.


A) requires authorization by a judge in the location of the tapped telephone
B) allows the issuance of interception orders for any felony offense
C) permits taps even when ordinary investigative procedures have not been exhausted
D) requires that the order be executed "as soon as practicable"

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Before the enactment of the _____, interception orders for wire communications in computer hacking investigations were not permitted.


A) Omnibus Crime Control and Safe Streets Act of 1968
B) FISA
C) Violent Crime Control and Law Enforcement Act of 1994
D) USA PATRIOT Act

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Under the _____ exception, victims of computer attacks by hackers can authorize law enforcement officials to intercept wire or electronic communications of a computer trespasser, if specific statutory requirements are satisfied.


A) computer trespasser
B) provider
C) public access
D) exceptional privilege

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Prior to the passing of Title III of the Omnibus Crime Control and Safe Streets Act of 1968, the United States Government utilized a "national security exception" to conduct warrantless electronic surveillance of foreign powers. In 1978, the Foreign Intelligence Surveillance Act (FISA) was passed as a result of the _____.


A) Watergate scandal
B) abuses of the Vietnam war
C) Iranian Hostage Crisis
D) violent acts by student groups

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Searches conducted using wiretaps, bugs, or other devices to overhear conversations or obtain other kinds of information are collectively referred to as __________ surveillance.

Correct Answer

verifed

verified

In Berger v. New York (1967) the issue was the constitutionality of a New York statute that authorized electronic surveillance pursuant to a judicial warrant. In the case, the Court:


A) validated the law because the government had probable cause and the intrusion was reasonably related to what the government was looking for
B) validated the law because it properly limited the nature, scope, or duration of the electronic surveillance
C) invalidated the law because the government did not establish probable cause
D) invalidated the law because it failed to properly limit the nature, scope, or duration of the electronic surveillance

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 41 - 60 of 60

Related Exams

Show Answer