Page 1517 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1517
6. B. The Fourth Amendment to the U.S. Constitution sets the
“probable cause” standard that law enforcement officers must
follow when conducting searches and/or seizures of private
property. It also states that those officers must obtain a warrant
before gaining involuntary access to such property.
7. A. Copyright law is the only type of intellectual property protection
available to Matthew. It covers only the specific software code that
Matthew used. It does not cover the process or ideas behind the
software. Trademark protection is not appropriate for this type of
situation. Patent protection does not apply to mathematical
algorithms. Matthew can’t seek trade secret protection because he
plans to publish the algorithm in a public technical journal.
8. D. Mary and Joe should treat their oil formula as a trade secret. As
long as they do not publicly disclose the formula, they can keep it a
company secret indefinitely.
9. C. Richard’s product name should be protected under trademark
law. Until his registration is granted, he can use the ™ symbol next
to it to inform others that it is protected under trademark law.
Once his application is approved, the name becomes a registered
trademark, and Richard can begin using the ® symbol.
10. A. The Privacy Act of 1974 limits the ways government agencies
may use information that private citizens disclose to them under
certain circumstances.
11. B. The Privacy Shield framework, governed by the U.S. Department
of Commerce and Federal Trade Commission, allows U.S.
companies to certify compliance with EU data protection law.
12. A. The Children’s Online Privacy Protection Act (COPPA) provides
severe penalties for companies that collect information from young
children without parental consent. COPPA states that this consent
must be obtained from the parents of children younger than the
age of 13 before any information is collected (other than basic
information required to obtain that consent).
13. A. The Digital Millennium Copyright Act does not include any
geographical location requirements for protection under the

