The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion {Ans: True}The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following? {Ans: cyberterrorism}Title I of which of the following acts extends the protections offered under the Wiretap Act to electronic communications, such as fax and messages sent over the Internet? {Ans: Electronic Communications Privacy Act}Pornography purveyors are free to produce and publish whatever they want; however, if what they distribute is judged obscene, they are subject to prosecution under the obscenity laws. {Ans: True}Which of the following involves the examination of Internet records in an attempt to reveal the identity of an anonymous poster? {Ans: Doxing}Which act became law in 1996 with the purpose of allowing freer competition among phone, cable, and TV companies? {Ans: Telecommunications Act}During which step of the decision-making process should one be extremely careful not to make assumptions about the situation? {Ans: Develop problem statement}Which of the following can be used against an anonymous defendant to