New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 1 Question 83 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 83
Topic #: 1
[All ISSEP Questions]

Which of the following acts is endorsed to provide a clear statement of the proscribed activity concerning computers to the law enforcement community, those who own and operate computers, and those tempted to commit crimes by unauthorized access to computers

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C, D

The following are the effects of loss of confidentiality, integrity, or availability in a high level

potential impact:

It might cause a severe degradation in or loss of mission capability to an extent.

It might result in a major damage to organizational assets.

It might result in a major financial loss.

It might result in severe harms such as serious life threatening injuries or loss of life.


Contribute your Thoughts:

0/2000 characters
Cherri
3 months ago
Wait, are we really sure about this? Sounds a bit off.
upvoted 0 times
...
Shenika
3 months ago
Agreed, CFAA is the go-to for unauthorized access laws.
upvoted 0 times
...
Nichelle
3 months ago
I thought FISMA was the main one for security management?
upvoted 0 times
...
Helene
4 months ago
Not so sure about that, GISRA seems more relevant.
upvoted 0 times
...
Mitzie
4 months ago
Definitely the Computer Fraud and Abuse Act!
upvoted 0 times
...
Norah
4 months ago
FISMA seems more about federal information security policies, so I doubt it’s the right answer. I think it’s probably between the CFAA and the Computer Security Act.
upvoted 0 times
...
Delfina
4 months ago
I feel like the Computer Security Act might be relevant too, but I can't recall if it specifically targets unauthorized access like the CFAA does.
upvoted 0 times
...
Florinda
4 months ago
I'm not entirely sure, but I remember GISRA focuses more on information security management rather than directly addressing computer crimes.
upvoted 0 times
...
Felix
5 months ago
I think the Computer Fraud and Abuse Act is the one that specifically addresses unauthorized access to computers. It seems to fit the question best.
upvoted 0 times
...
Norah
5 months ago
I feel pretty confident about this one. The Computer Fraud and Abuse Act is the key law that defines and prohibits unauthorized access to computers, so that's got to be the right answer here.
upvoted 0 times
...
Merri
5 months ago
Okay, let me see if I can break this down. The question is asking which act provides a clear statement on proscribed computer-related activities to law enforcement, computer owners, and potential criminals. Based on that, I think the Computer Fraud and Abuse Act is the best answer.
upvoted 0 times
...
Mose
5 months ago
Hmm, I'm a bit unsure on this one. I know there are a few different laws and acts related to computer security, but I can't quite remember the specifics of each one. I'll have to think this through carefully.
upvoted 0 times
...
Alana
5 months ago
I'm pretty sure the answer is A - the Computer Fraud and Abuse Act. That's the one that's supposed to provide clear guidance on unauthorized computer access, right?
upvoted 0 times
...
Tarra
5 months ago
This seems like a straightforward question about the objectives of a programme. I'll carefully read through the options and try to identify the one that is not an objective.
upvoted 0 times
...
Rosalia
5 months ago
Hmm, I'm a bit unsure about this one. The categories of auditing standards are something I need to review more closely. Let me think through each option methodically.
upvoted 0 times
...
Heike
5 months ago
Hmm, I'm a bit confused on the different FDA recall classes. I'll need to review that information again before answering this.
upvoted 0 times
...
Herman
10 months ago
I don't know, the Computer Security Act just sounds so much more fun. Where's the creativity in the Fraud and Abuse one?
upvoted 0 times
Fernanda
9 months ago
User 3: I agree, the Computer Security Act definitely has a more creative ring to it.
upvoted 0 times
...
Lindsey
9 months ago
User 2: Yeah, it does sound more interesting than the Computer Fraud and Abuse Act.
upvoted 0 times
...
Kerry
9 months ago
User 1: I think the Computer Security Act sounds more exciting too.
upvoted 0 times
...
...
Erick
10 months ago
Hmm, the Computer Fraud and Abuse Act - sounds like the feds are really cracking down on my plan to hack the Pentagon.
upvoted 0 times
...
Arlene
10 months ago
As an aspiring hacker, I'm not a fan of the Computer Fraud and Abuse Act. But I guess it's the right answer.
upvoted 0 times
Jestine
8 months ago
Definitely, the Computer Fraud and Abuse Act is the one that addresses unauthorized access to computers.
upvoted 0 times
...
Laurene
8 months ago
Yeah, the Computer Fraud and Abuse Act is the one that clearly defines the prohibited activities.
upvoted 0 times
...
Crista
8 months ago
I agree, the Computer Fraud and Abuse Act is the correct answer.
upvoted 0 times
...
Pearly
8 months ago
D) Federal Information Security Management Act (FISMA)
upvoted 0 times
...
Georgiana
8 months ago
C) Computer Security Act
upvoted 0 times
...
Xuan
9 months ago
B) Government Information Security Reform Act (GISRA)
upvoted 0 times
...
Hollis
9 months ago
A) Computer Fraud and Abuse Act
upvoted 0 times
...
...
Patrick
10 months ago
I'm going with option A. Seems like the most comprehensive one for tackling computer crime.
upvoted 0 times
Freeman
10 months ago
I think option D is also important for managing information security.
upvoted 0 times
...
Rebbeca
10 months ago
I agree, option A covers a wide range of computer crimes.
upvoted 0 times
...
...
Ming
11 months ago
I'm not sure, but I think C) Computer Security Act could also be a good option to provide clear guidelines.
upvoted 0 times
...
Estrella
11 months ago
The Computer Fraud and Abuse Act sounds like the clear winner here. Gotta love that proscribed activity!
upvoted 0 times
Yolando
10 months ago
D) Federal Information Security Management Act (FISMA)
upvoted 0 times
...
Deonna
10 months ago
I think the Computer Security Act could also be a good option.
upvoted 0 times
...
Malcolm
10 months ago
C) Computer Security Act
upvoted 0 times
...
Bettina
10 months ago
I agree, the Computer Fraud and Abuse Act is the way to go.
upvoted 0 times
...
Barrie
10 months ago
A) Computer Fraud and Abuse Act
upvoted 0 times
...
...
Christiane
11 months ago
I agree with Ruthann, because it clearly defines the prohibited activities related to computers.
upvoted 0 times
...
Ruthann
11 months ago
I think the answer is A) Computer Fraud and Abuse Act.
upvoted 0 times
...

Save Cancel