Protection of children against sexual exploitation act

Assignment Help Computer Network Security
Reference no: EM13765633

Question 1

The court decision that defined obscenity as being a work that "taken as a whole, lacks serious literary, artistic, political, or scientific value" is:

A. Roth v. United States.

B. FCC v. Pacifica Foundation.

C. Miller v. California.

D. Furman v. Georgia.

Question 2

Which of the following Supreme Court cases, affecting all subsequent obscenity rulings since, held that the state has a "compelling interest" in protecting the welfare of children?

A. Roth v. United States

B. FCC v. Pacifica Foundation

C. Miller v. California

D. Regina v. Hicklin

Question 3

Which of the following acts first attempted to protect families and children from online sexually explicit acts?

A. Telecommunications Reform Act of 1996

B. Child Pornography Prevention Act of 1982

C. Child Protection Act of 1984

D. Protection of Children Against Sexual Exploitation Act of 1977

Question 4

In an effort to tighten prohibitions at the Federal level against child pornography, what did Congress introduce that eliminated the obscenity requirement established in Miller v. California?

A. Telecommunications Reform Act of 1996

B. Child Pornography Prevention Act of 1982

C. Child Protection Act of 1984

D. Protection of Children Against Sexual Exploitation Act of 1977

Question 5

Without question, the single most important court decision regarding state prohibitions of child pornography is:

A. New York v. Ferber.

B. Miller v. California.

C. Stanley v. Georgia.

D. Osborne v. Ohio.

Question 6

The Supreme Court has said that states have more leeway in the regulation of pornographic depictions of children than in the regulation of obscenity because:

A. the Supreme Court has no jurisdiction over state lawmaking.

B. the use of children as subjects of pornographic materials is harmful to the mental health of the child.

C. no obscenity statute has ever been upheld by the Supreme Court.

D. most state constitutions do not allow for freedom of expression.

Question 7

What replaced the "Protection of Children Against Sexual Exploitation of 1977" act?

A. The Omnibus Crime Control Bill

B. Title 18 of the United States Code

C. The three pronged test of Cahill v. Utah

D. The Child Protection Act of 1984

Question 8

Which of the following was enacted in anticipation of an explosion of explicit material emerging on the Internet and specifically targets the issue of virtual child pornography?

A. Telecommunications Reform Act of 1996

B. Child Pornography Prevention Act of 1996

C. Child Protection Act of 1984

D. Protection of Children Against Sexual Exploitation Act

Question 9

What court struck down most of the Child Pornography Prevention Act, saying that it was unconstitutional to the extent that it proscribed computer images that did not involve the use of real children in their production or dissemination?

A. The Eleventh Circuit Court of Appeals

B. The Sixth Circuit Court of Appeals

C. The Eighth Circuit Court of Appeals

D. the Ninth Circuit Court of Appeals

Question 10

What issue, of interest to computer crime prosecutors, has not yet been ruled upon by the United States Supreme Court?

A. Whether the First Amendment will be applicable to Internet communications

B. Legislation dealing with technologically generated computer images

C. The continuation of the exclusionary rule

D. Whether Congress can pass laws prohibiting child pornography

Question 11

The probable cause requirement of the Fourth Amendment:

A. is based on a "reasonable person" standard.

B. does not apply if you have a warrant.

C. does not apply in computer crimes.

D. applies only when police get a warrant.

Question 12

The Electronic Communications Privacy Act of 1986 gave individuals more protection than the Fourth Amendment because:

A. the Fourth Amendment does not apply to state police, it only applies to federal authorities.

B. statutory law is more binding than case law.

C. it applies to all individuals, not just those acting on behalf of the government.

D. it makes the "equal protection" clause of the Fourteenth Amendment applicable to the states.

Question 13

One failing of the Electronic Communications Privacy Act of 1986 is that:

A. it was found to be "arbitrary and capricious" by the Ninth Circuit.

B. it only extends to communications which affect interstate or foreign commerce.

C. jurisdictional issues render it impossible to enforce.

D. it expires by operation of law in 2006.

Question 14

Which act requires manufacturers of telecommunications equipment and service providers to develop systems which provide the capability for surveillance of telephone and cellular communications, advanced paging, satellite-based systems, and specialized mobile radio?

A. CALEA

B. ECPA

C. PPA

D. Harrison Communications Act of 1997

Question 15

Which of the following is TRUE concerning search warrants?

A. Contraband cannot be seized unless it is specifically mentioned in the warrant.

B. Federal law enforcement authorities are not required to get search warrants.

C. The warrant must describe with particularity the places to be searched and the items to be seized.

D. A search warrant can only be obtained from a federal judge.

Question 16

Lawrence decides to have a few friends over for a cookout. While he is outside flipping burgers on the grill, one of his guests goes inside Lawrence's house and starts looking through the files on his computer without Lawrence's permission. He finds pornographic pictures that Lawrence has made of some of the neighborhood kids. Although he is not affiliated with law enforcement in any way, the guest feels it is his civic duty to copy the files onto a disc and turn them over to the police. Lawrence is arrested. Lawrence tells his lawyer that his Fourth Amendment rights have been violated because the search and seizure was unreasonable. This argument is:

A. not valid. Since computer evidence can be destroyed easily and quickly, exigent circumstances dictated that no warrant was necessary.

B. valid because there was no probable cause for the guest to have searched the computer prior to his doing so. Any evidence found must be excluded.

C. valid because a warrant was necessary to seize the files.

D. not valid because no Fourth Amendment protection exists for searches conducted by someone acting independently absent direction from the government.

Question 17

Not all searches require a search warrant. For example, a consent search does not require a warrant if which of the following requirements is met?

A. The person giving the consent must have the proper authority over the area to be searched and is legally capable of granting such access.

B. It can be shown that a magistrate or judge was unavailable.

C. It can be shown that those conducting the search checked with the U.S. Attorney's office before proceeding.

D. The person giving the consent must be advised beforehand that any evidence seized can be used in a court of law against him and that he has the right to an attorney before the search takes place.

Question 18

The police obtain a search warrant to go to Harry's house and look for stolen computers. They serve the warrant and, once inside, begin their search. While on the scene, one of the officers sees a bag of marijuana in plain view on Harry's coffee table. He immediately knows it is marijuana, based on his 10 years of experience as a drug officer. The evidence is seized, and Harry is charged with possession of marijuana. Was the seizure of the marijuana valid under the Fourth Amendment?

A. Absolutely not. The Fourth Amendment requires that the object of the search be described with particularity. Since the police had no probable cause to search for drugs, and it wasn't mentioned in the warrant, they exceeded the bounds of the warrant, and the exclusionary rule will require that the evidence be thrown out.

B. Absolutely. The police were acting in a lawful manner by being in the house to serve a search warrant. Since they were legally on the scene, anything in plain view which is obviously evidence of any crime can be seized and will be admissible in Harry's trial.

C. Absolutely not. Unless the officer who seized it is a drug identification expert and tested the material, there is no way that the officer can know for certain that the item was in fact marijuana. The motion to suppress this evidence will be granted by the judge.

D. Absolutely. Marijuana is contraband, and it is illegal to possess it. As such, there are no Fourth Amendment protections. Regardless of whether the police were in an area where they were legally entitled to be or not, this evidence can be seized and will be admissible in court at Harry's trial.

Question 19

A computer crime investigator looks for suspected child molesters by going to a live chat room on the Internet. She does not identify herself as a police officer. In fact, she does not say anything at all but remains silent in the chat room. If she is able to obtain enough evidence to use against a molester to build a case against him, what will most courts likely say about her methods? (Assume for the purposes of this question that the court in question is not the Ninth Circuit Court of Appeals.)

A. Most courts will likely say that a wiretap was required prior to obtaining any evidence.

B. Most courts will likely say that the molester had a reasonable expectation of privacy since the officer did not say anything and the molester did not know she was there. Therefore, any evidence collected will be excluded.

C. Most courts will likely say that no warrant was required. Since the officer could read the offending words on her screen, they are considered to be in "plain view" and are thus exempt from the warrant requirement of the Fourth Amendment.

D. Most courts will likely say that there is no expectation of privacy in an Internet chat room since others are likely to visit there. Therefore, no warrant is necessary.

Question 20

Generally, it can be said that because the courts recognize the difficulty of detection and prosecution of cyberspace child pornography, they tend to:

A. give child pornographers the harshest possible sentences.

B. rule consistently from court to court.

C. give child pornographers sentences far less than those provided for under law.

D. fail to agree on the appropriateness of traditional investigative techniques.

Reference no: EM13765633

Questions Cloud

Create graphic organizer that include a definition for voice : Create a graphic organizer that includes a definition for each trait, as well as an activity that supports learning. 6+1 Trait Writing Model of Instruction & Assessment.
Prepare the journal entries to record : Prepare the journal entries to record these transactions on the books of Bogner Company using a perpetual inventory system.
Explain how you would integrate security requirements : Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system
Identify scholarly work : In this assignment, you will research and identify scholarly work that you can use to support your research.
Protection of children against sexual exploitation act : What court struck down most of the Child Pornography Prevention Act, saying that it was unconstitutional to the extent that it proscribed computer images that did not involve the use of real children in their production or dissemination
Write an character paragraph about henry hill and karen hill : write about the characters short paragraphs about Henry Hill, Karen Hill, Jimmy Conway, Tommy DeVito, Paulie Cicero, Morrie Kessler, Billy Batts and Janice Rossi (Henry's girlfriend).
Summarize arguments of counsel regarding self-incrimination : Summarize the arguments of counsel regarding self-incrimination. Why is the case significant with respect to the right to counsel and self-incrimination
Assignment-calculating inventory : Finlon Upholstery Inc. uses a job-order costing system to accumulate manufacturing costs. The company's work-in-process on December 31, 2001, consisted of one job (no. 2077), which was carried on the year-end balance sheet at $156,800. There was n..
How a defendants rights at trial can be assured : Create a 6 to 12 slide presentation in which you articulate how a defendant's rights at trial can be assured. Include how to assure a defendant is provided the following: The right to a speedy trial

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create list of security issues which the firm must monitor

You decide to create security checklist for New Century. Create list of security issues which the firm must evaluate and monitor. Make sure to organize items into categories which match five security levels.

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Security and privacy in cloud computing

Prepare a report on the following scenario about security and privacy in cloud computing - Recently increased use of mobile devices and the growth of the Internet in current business practices have led to the provision of Cloud Computing

  Develop its own mib for managing a product line

Suppose you worked for a Canadian base company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered?

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  Prepare a graph of the storage requirements

Prepare a graph of the storage requirements for the project.

  How to generate the same hash value

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Mini case: cisco systems

Mini Case: Cisco Systems

  Identify and explain how the breach occurred

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Describe routing attacks

Briefly describe what routing attacks are. Provide two examples, highlighting their main characteristics. Can you explain what are routing attacks and show the main characteristics of this attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd