AWR-168-W - Module 2 Post Test

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

AWR-168-W Cyber Law and White Collar Crime

Module 2 Pre-Test
Each module will begin with a pre-test. The pre-test score does not count toward course completion, but is used to measure your knowledge
prior to going through the module content.

Question 1
Correct
1.00 points out of 1.00

Flag question
Question text
The CFAA was initially drafted to protect classified information that was being
maintained on federal government computers, as well as for the protection of
financial records and _________ on government and financial institution
computers.
Select one:
a. Intellectual property
b. Trademarks
c. Derivative works

d. Credit information
Question 2
Incorrect
0.00 points out of 1.00

Flag question
Question text
Can the Wire Fraud Act, as amended, be used to prosecute wholesale copyright
violations sent or received over the Internet?
Select one:
a. Yes

b. No
Question 3
Correct
1.00 points out of 1.00

Flag question
Question text
Congress passed the Computer Fraud and Abuse Act (CFAA) in 1984 with the
hope of protecting government information. What did the new laws and
legislation initially aim to prevent?
Select one:
a. Intellectual property cybercrimes.
b. Internet auction fraud.
c. The posting of offensive materials (such as pornography, abortion material,
“curse” words or other offensive language) in a public forum on the Internet
such as Web pages or online discussion groups.
d. Knowingly accessing a computer without authorization in order to obtain
national security data.
Question 4
Correct
1.00 points out of 1.00
Flag question
Question text
The _________ prohibits individuals from "transport[ing] in interstate or
foreign commerce any goods, wares, securities, or money of the value of
$5,000 or more, knowing the same to have been stolen, converted or taken by
fraud."
Select one:
a. USA PATRIOT Act
b. Wire Fraud Statute

c. National Stolen Property Act


d. World Intellectual Property Organization
Question 5
Incorrect
0.00 points out of 1.00

Flag question
Question text
What is the condition that would determine whether a person who intentionally
accesses a computer without authorization and thereby obtains information
from a protected computer is a violation of the Computer Fraud and Abuse
Act?
Select one:
a. If the conduct involves an interstate or foreign communication.
b. If personal information was collected by entities under U.S. jurisdiction from
children less than 13 years of age.

c. If it involves creation or use of spyware.


d. If it processes any transfer of funds to gambling businesses in connection
with unlawful Internet gambling.
Question 6
Correct
1.00 points out of 1.00

Flag question
Question text
Various scholars assert that when many laws were created and court rulings
announced, new technology was not known nor could it be anticipated; the
question arises as to whether new laws should be crafted to apply to new
technology, or new technology be governed by __________.
Select one:
a. the WTO
b. TRUSTe

c. Existing laws
d. FEMA
Question 7
Incorrect
0.00 points out of 1.00

Flag question
Question text
What Act was intended to complement the Mail Fraud statute and give federal
prosecutors jurisdiction over fraud involving the use of wire transmissions?
Select one:

a. National Stolen Property Act


b. Civil Fraud Act
c. Criminal Fraud Act
d. Wire Fraud Act
Question 8
Correct
1.00 points out of 1.00

Flag question
Question text
Permission to use a copyrighted work or a trademark is secured by a license;
however, a license is a(n) _________ right.
Select one:
a. Earned

b. Revocable
c. Equal
d. Inherent
Question 9
Correct
1.00 points out of 1.00
Flag question
Question text
The court in United States v. Brown determined that a computer program does
not constitute "goods, wares, merchandise, securities, or money." For the
purpose of the National Stolen Property Act, a computer program is considered
_________.
Select one:
a. Intangible derivative works

b. Intangible intellectual property


c. Tangible intellectual property
d. Tangible derivative works
Question 10
Correct
1.00 points out of 1.00

Flag question
Question text
What violation of law is simple and tempting due to our easy access to
scanning and duplicating technologies, as well as to reproducing quality Web
content and digital files?
Select one:
a. Black hat hacking

b. Copyright infringement
c. Dumpster diving
d. Extortion
Question 11
Correct
1.00 points out of 1.00

Flag question
Question text
One exception of the National Stolen Property Act is: it shall not apply to any
falsely made, forged, altered, counterfeited, or spurious representation of any
bank note or bill issued by a bank or corporation of any foreign country which
is intended by the laws or usage of such country to circulate as ________.
Select one:

a. Money
b. Copyrighted materials
c. Tangible derivative works
d. Intangible intellectual property
Question 12
Correct
1.00 points out of 1.00

Flag question
Question text
In the world of electronic commerce, a business may use the CFAA as a
guideline to draft their __________.
Select one:

a. Company's Internet and electronic mail use policies


b. Company's Code of Ethics
c. Pseudonym
d. Privacy policy

You might also like