Exam 25: Privacy
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
_______________ are designed to prevent the transfer of cookies between browsers and web servers.
Free
(Short Answer)
4.7/5
(34)
Correct Answer:
Cookie cutters
Which law mandates that information that is no longer needed must be properly disposed of,either by burning,pulverizing,or shredding?
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
C
The development of a privacy policy is an essential foundational element of a company's privacy stance.
Free
(True/False)
4.8/5
(41)
Correct Answer:
True
The three things that should govern how good citizenry collects PII are notice,choice,and consent.
(True/False)
4.9/5
(38)
Which law was designed to enable public access to US government records?
(Multiple Choice)
4.8/5
(30)
In the United States the primary path to privacy is _______.In Europe the primary path to privacy is _________.
(Multiple Choice)
4.9/5
(29)
A structured approach to determining the gap between desired privacy performance and actual privacy performance is called
(Multiple Choice)
4.7/5
(25)
The _______________ was designed to enable public access to US government records,where public includes the press which acts on behalf of the public to obtain information.
(Short Answer)
4.9/5
(29)
In the United States,the primary path to privacy is via opt-out,whereas in Europe and other countries,it is via opt-in.
(True/False)
4.8/5
(40)
Which of the following is true about the Family Education Records and Privacy Act of 1974?
(Multiple Choice)
4.7/5
(29)
FACTA mandates that information that is no longer needed must be properly disposed of.
(True/False)
4.7/5
(37)
_______________ is at the top of the list of privacy-enhancing technology (PET)for protecting privacy and anonymity.
(Short Answer)
4.9/5
(32)
What is the mechanism for self-regulation that can be enforced through trade practice law via the FTC called?
(Multiple Choice)
4.9/5
(37)
_______________ are small bits of text that are stored on the user's machine and sent to specific websites when the user visits.
(Short Answer)
4.8/5
(36)
Which of the following is a standard that provides guidance on the elements of a credit card transaction that needs protection and the level of expected protection?
(Multiple Choice)
4.8/5
(33)
The governments in Europe and the United States have taken the same approach to controlling privacy through legislation.
(True/False)
5.0/5
(30)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)