Which law requires both parties to consent to the recording of a conversation? -
*answers *Electronic Communications Privacy Act (ECPA)
Which law is related to the disclosure of personally identifiable protected health
information (PHI)? - *answers *Health Insurance Portability and Accountability Act
(HIPAA)
Which U.S. law criminalizes the act of knowingly using a misleading domain name with
the intent to deceive a minor into viewing harmful material? - *answers *18 U.S.C.
2252B
Which U.S. law protects journalists from turning over their work or sources to law
enforcement before the information is shared with the public? - *answers *The Privacy
Protection Act (PPA)
Which law or guideline lists the four states a mobile device can be in when data is
extracted from it? - *answers *NIST SP 800-72 Guidelines
Which law includes a provision permitting the wiretapping of VoIP calls? - *answers
*Communications Assistance to Law Enforcement Act (CALEA
Which policy is included in the CAN-SPAM Act? - *answers *The email sender must
provide some mechanism whereby the receiver can opt out of future emails and that
method cannot require the receiver to pay in order to opt out.
Which United States law requires telecommunications equipment manufacturers to
provide built-in surveillance capabilities for federal agencies? - *answers
*Communication Assistance to Law Enforcement Act (CALEA)
Which law requires a search warrant or one of the recognized exceptions to the search
warrant requirements for searching email messages on a computer? - *answers *The
Fourth Amendment to the U.S. Constitution
During a cyber-forensics investigation, a USB drive was found that contained multiple
pictures of the same flower.
How should an investigator use properties of a file to detect steganography? - *answers
*Review the hexadecimal code looking for anomalies in the file headers and endings
using a tool such as EnCase
A system administrator believes data are being leaked from the organization. The
administrator decides to use steganography to hide tracking information in the types of
files he thinks are being leaked.
Which steganographic term describes this tracking information? - *answers *Payload