Free II0-001 Exam Braindumps (page: 21)

Page 20 of 58

The Foreign Intelligence Surveillance Act (FISA) of 1978 was primarily dealing with:

  1. The methods of gathering intelligence on foreign nations according to international rules of conduct.
  2. Distinction between the rules of surveillance in dealing with domestic crime (covered under ECPA) and foreign power espionage.
  3. There is no domestic OR international laws dealing specifically with foreign power espionage.
  4. This law only dealt with the legality of collecting evidence on foreign soil for domestic investigation of foreign power espionage by federal agencies.

Answer(s): B



The Counterfeit Access Device and Computer Fraud and Abuse Act of 1986 was designed to do the following except:

  1. Criminalize unauthorized access of federal government computers.
  2. Criminalize unauthorized access to computers owned by large financial organizations.
  3. Give the Federal Bureau of Investigation jurisdiction to investigate computer crime.
  4. Criminalize accessing a "protected computer" used for communication or in foreign commerce.

Answer(s): C



The Wiretap and Stored Communications Access Act adds an additional component to previous laws by:

  1. Providing for law governing the use of stored electronic communications (such as saved e-mails and voicemails).
  2. By making electronic traffic on the Internet exempt from the pen register/trap and trace laws.
  3. By making ISP directly responsible for monitoring for illicit traffic using the FBI Rapter Protocols
  4. There is no such thing as the Wiretap and Stored Communication Access Act. The law that deals with electronic surveillance is the Electronic Communications Privacy Act of 1986

Answer(s): A



The Computer Fraud and Abuse Act applies to:

  1. Financial fraud at U.S. banking institutions that are governed by the O.T.C
  2. Computers used in committing financial fraud on U.S. financial institutions that are physically located outside the U.S.
  3. The use of computers for internet based fraud (specifically in response to online auction fraud based on U.S. vs. Sherman (2000))
  4. Use of government computer systems to defraud the public trust.

Answer(s): B






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts