Scenario: Three men sitting in a parking lot at a national home improvement center use a homemade antenna on the roof of their car to gain access into the corporate network through an unsecured Wireless LAN. They are able to access finance department servers at the corporate headquarters and are ultimately arrested by FBI investigators.
Referring to the scenario above, under what Federal Law is it likely they will be prosecuted?
Choice 1 USA Patriot Act of 2001
Choice 2 Computer Fraud and Abuse Act of 1986
Choice 3 Electronic Communications Privacy Act of 1986
Choice 4 Financial Modernization Act (GLBA)
Choice 5 HIPAA
The Network layer of the OSI reference model is responsible for which one of the following aspects of network communication?
Choice 1 Inserting protocol addresses
Choice 2 Determining port number
Choice 3 Encrypting the data
Choice 4 Translating data representation
Choice 5 Inserting check points in the data stream
Scenario: Alice would like to send Bob a private message using a symmetric cryptography algorithm.
Referring to the scenario above, what key does Alice use to encrypt the message?
Choice 1 Alice’s public key
Choice 2 Alice’s private key
Choice 3 Bob’s public key
Choice 4 Bob’s private key
Choice 5 Shared secret key