CISSP-ISSEP · Question #71
CISSP-ISSEP Question #71: Real Exam Question with Answer & Explanation
The correct answer is A: 18 U.S.C. 1030. 18 U.S.C. 1030 (CFAA) is the cornerstone computer crime law, directly criminalizing unauthorized access to computers and networks - the core of hacking. 18 U.S.C. 1029 covers fraud involving access devices (stolen credentials, account numbers, counterfeit tokens), which is intrin
Question
Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.
Options
- A18 U.S.C. 1030
- B18 U.S.C. 1029
- C18 U.S.C. 2510
- D18 U.S.C. 1028
Explanation
18 U.S.C. 1030 (CFAA) is the cornerstone computer crime law, directly criminalizing unauthorized access to computers and networks - the core of hacking. 18 U.S.C. 1029 covers fraud involving access devices (stolen credentials, account numbers, counterfeit tokens), which is intrinsic to many hacking operations that harvest or abuse access credentials. 18 U.S.C. 2510, the Wiretap Act, prohibits unauthorized interception of electronic communications, making it applicable to network sniffing and man-in-the-middle attacks.
Option D (18 U.S.C. 1028) is the distractor - it covers fraud related to physical identification documents (fake IDs, forged government documents), which is an identity crime, not a hacking/cyber intrusion law.
Memory tip: Think of the "hacking trio" as Access the Computer (1030) → Steal the Credentials (1029) → Intercept the Wire (2510). 1028 is the odd one out because it lives in the physical world of fake IDs, not cyberspace.
Topics
Community Discussion
No community discussion yet for this question.