nerdexam
(ISC)2(ISC)2

CISSP-ISSEP · Question #71

CISSP-ISSEP Question #71: Real Exam Question with Answer & Explanation

The correct answer is A: 18 U.S.C. 1030. 18 U.S.C. 1030 (CFAA) is the cornerstone computer crime law, directly criminalizing unauthorized access to computers and networks - the core of hacking. 18 U.S.C. 1029 covers fraud involving access devices (stolen credentials, account numbers, counterfeit tokens), which is intrin

Governance and Training

Question

Which of the following federal laws are related to hacking activities? Each correct answer represents a complete solution. Choose three.

Options

  • A18 U.S.C. 1030
  • B18 U.S.C. 1029
  • C18 U.S.C. 2510
  • D18 U.S.C. 1028

Explanation

18 U.S.C. 1030 (CFAA) is the cornerstone computer crime law, directly criminalizing unauthorized access to computers and networks - the core of hacking. 18 U.S.C. 1029 covers fraud involving access devices (stolen credentials, account numbers, counterfeit tokens), which is intrinsic to many hacking operations that harvest or abuse access credentials. 18 U.S.C. 2510, the Wiretap Act, prohibits unauthorized interception of electronic communications, making it applicable to network sniffing and man-in-the-middle attacks.

Option D (18 U.S.C. 1028) is the distractor - it covers fraud related to physical identification documents (fake IDs, forged government documents), which is an identity crime, not a hacking/cyber intrusion law.

Memory tip: Think of the "hacking trio" as Access the Computer (1030) → Steal the Credentials (1029) → Intercept the Wire (2510). 1028 is the odd one out because it lives in the physical world of fake IDs, not cyberspace.

Topics

#Federal Laws#Cybercrime#Legal Compliance#Hacking Statutes

Community Discussion

No community discussion yet for this question.

Full CISSP-ISSEP PracticeBrowse All CISSP-ISSEP Questions