Deck 12: Managing Information Security and Privacy

Full screen (f)
exit full mode
Question
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.
Use Space or
up arrow
down arrow
to flip the card.
Question
Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.
Question
Denial of service always occurs because of malicious attacks on the system.
Question
Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication.
Question
Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks.
Question
Malware protection is an example of a technical safeguard.
Question
Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data,such as account numbers.
Question
Care must be taken when terminating employees because they may take harmful and malicious actions.
Question
Malware is used in denial of service attacks.
Question
Biometric authentication has been around for some time,and because of weaknesses is not likely to see much usage in the future.
Question
Spoofing is a technique for intercepting computer communications.
Question
Data safeguards are designed to protect computer networks.
Question
A retinal scan would be considered a biometric authentication technique.
Question
Technical safeguards involve the hardware and software components of an information system.
Question
People who intentionally gain unauthorized access to computer systems are called hackers.
Question
Any action,device,procedure,technique,or other measure that reduces a system's vulnerability to a threat is a safeguard.
Question
To protect against lost or sabotaged encryption keys,a trusted party should keep a copy of the key.
Question
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
Question
Encryption is one of several technical safeguards.
Question
Most anti-malware programs check e-mail attachments for malware code.
Question
Organizations should protect sensitive data by storing it in ________ form.

A) compressed
B) secure
C) digital
D) encrypted
E) standardized
Question
Bloggers have not yet had much of an impact on the main stream media.
Question
Users should scan their computers with anti-malware programs at least

A) once a year.
B) biannually.
C) once a week.
D) daily.
E) once a month.
Question
Backup and recovery,passwords,and encryption are human safeguards.
Question
Following a disaster,hot sites provide office space,but customers themselves must come and provide and install the equipment needed to continue operations.
Question
Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.

A) reasonable
B) reputable
C) entrepreneurial
D) inexpensive
E) illegitimate
Question
About ninety percent of all viruses are spread via

A) spreadsheets.
B) AOL.
C) technology.
D) network worms.
E) email.
Question
It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n)

A) web page.
B) file.
C) e-mail
D) computer.
E) account.
Question
Because encryption keys can be lost or destroyed,a copy of the key should be stored with a trusted third party called a(n)

A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
Question
________ safeguards involve the people and procedure components of information systems.

A) Human
B) Data
C) Technical
D) Malware
E) Firewall
Question
Organizations should store at least some of the _______________ of the database contents off the premises,possibly in a remote location.

A) backups
B) company information
C) malware definitions
D) smaller parts
Question
________,which are the patterns that exist in malware code,should be downloaded and updated frequently.

A) Software updates
B) Service packs
C) Malware patterns
D) Network patches
E) Malware definitions
Question
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
Question
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
Question
The purpose of a(n)________ is to protect databases and other organizational data.

A) data warehouse
B) data security group
C) operations group
D) data safeguard
E) steering committee
Question
The best safeguard against a natural disaster is to have a safe location.
Question
Help desks have not been the source of many security problems in the past.
Question
Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.

A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
Question
________ to (for)the physical computers that run the DBMS and all devices that store database data should be carefully controlled.

A) References
B) Access
C) Design plans
D) Connections
E) Documentation
Question
If you ever receive notification that your password has been reset when you did not request a reset,immediately contact your IS department.
Question
A(n)________ card has a microchip on it that is loaded with identifying data.

A) smart
B) debit
C) credit
D) ATM
E) identity
Question
________ considerations should be part of the hiring process.

A) Weight
B) Position
C) Gender
D) Age
E) Security
Question
A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.

A) web farm
B) development site
C) cold site
D) hot site
E) server farm
Question
In order to prioritize their activities and protect an organization from possible risk and loss,security personnel must document the position ________ of all employees.

A) riskiness
B) data access
C) controls
D) level
E) sensitivity
Question
In order to intercept communications on ________ networks,drive-by sniffers simply drive or walk around with computers with wireless connections.

A) commercial
B) LAN
C) wireless
D) ISP
E) WAN
Question
________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.

A) phishing
B) Hacking
C) Spoofing
D) PIPEDA
E) Identity theft
Question
Because they kept giving out passwords to users who claimed to have forgotten them,________ were a serious security risk in the organization.

A) interns
B) help desks
C) data administrators
D) executives
E) developers
Question
Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.

A) programs
B) logs
C) graphics
D) calls
E) accounts
Question
Some of the biggest security threats are from ________ employees.

A) disinterested
B) disgruntled
C) self-motivated
D) happy
E) contrarian
Question
A company should clearly define the security ________ for each position.

A) accounts
B) levels
C) responsibilities
D) backups
E) safeguards
Question
The existence of ________ user accounts is a serious security threat.

A) unused
B) network
C) meta
D) employee
E) modified
Question
A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.

A) hacker
B) phisher
C) spoofer
D) hawker
E) employee
Question
When an employee is terminated,system administrators should receive advance notice so they can

A) plan for security changes.
B) get the employees computer.
C) remove accounts and passwords.
D) fight over the person's office.
E) plan a termination party.
Question
When an employee notices a virus on his machine,the ________ plan should specify what to do.

A) antivirus
B) security
C) technology
D) company
E) incident response
Question
The best way to safeguard a web site from public users is to ________ the web site against an attack.

A) secure
B) prepare
C) defend
D) harden
E) update
Question
________ are the primary means of authentication.

A) Encrypted keys
B) Network administrators
C) Passwords
D) Single sign-on
E) Facial scans
Question
________ is a technique for intercepting computer communications.

A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
Question
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.

A) central
B) air-conditioned
C) high-tech
D) fire-resistant
E) easily accessible
Question
Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.

A) security
B) intrusion
C) antivirus
D) malware
E) biometric
Question
A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests.

A) programming
B) flooding
C) denying
D) hacking
E) probing
Question
User accounts should be given (the)________ to perform their jobs

A) least possible privileges needed
B) most possible privileges needed
C) administrator privileges
D) user privileges
E) company standard privileges
Question
According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ___________ personal information.

A) using
B) safeguarding
C) disclosing
D) collecting
E) maintaining
Question
What is pretexting?
Question
Enforcement consists of ________ interdependent factors.

A) 4
B) 2
C) 5
D) 3
E) 6
Question
The web site _______________________ lists simple things to do to lower your risk of identity theft.

A) HYPERLINK "http://www.wordpress.com" www.wordpress.com
B) HYPERLINK "http://www.google.ca" www.google.ca
C) HYPERLINK "http://www.safecanada.com" www.safecanada.com
D) HYPERLINK "http://www.priv.gc.da" www.priv.gc.da
E) HYPERLINK "http://www.equifax.com" www.equifax.com
Question
If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with

A) Industry Canada
B) RCMP
C) the local police.
D) Revenue Canada.
E) Office of the Privacy Commissioner of Canada.
Question
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.

A) Data contents protection
B) Data safeguarding
C) Data integrity
D) Data administration
E) Data rights administration
Question
Users often resist biometric identification because they feel it is

A) expensive.
B) ineffective.
C) too technical.
D) invasive.
E) hard to use.
Question
What is phishing?
Question
After installing anti-virus and antispyware,what is the best way to avoid malware?

A) Encrypt your work
B) Give your friend your passwords.
C) Shut the computer down at the end of the day.
D) Open all email by double clicking.
E) Don't open email attachments from unknown sources.
Question
When an incident is reported,________ is (are)of the essence.

A) the response
B) preparation
C) speed
D) a systematic approach
E) actions
Question
PIPEDA stands for

A) Personal Information Protection and Electronic Disclosure Act.
B) Personal Information Protection and Effective Disclosures Act.
C) Personal Information Protection and Electronic Disclosures Act.
D) Personal Information Protection and Electronic Documents Act.
E) Personal Information Protection and Electronic Disclosure Actions.
Question
A security incident reporting plan should ________ all incident reports.

A) centralize
B) generalize
C) standardize
D) decentralize
E) prioritize
Question
PIPEDA gives individuals the right to know why an organization is ________ their personal information.

A) collecting and disclosing
B) collecting and changing
C) collecting, using or disclosing
D) changing
E) using and disclosing
Question
Adware is ________ than spyware.

A) more serious
B) less annoying
C) more malicious
D) more benign
E) harder to get rid of
Question
Hardening is actually a(n)________ safeguard.

A) technical
B) security
C) data
D) human
E) accountability
Question
The popularity and efficacy of search engines like Google have created a source of

A) entertainment.
B) inadvertent information disclosure.
C) phishing.
D) pretexting.
E) sniffing.
Question
Security policy establishment is the responsibility of

A) middle managers.
B) the CEO.
C) corporate lawyers.
D) senior management.
E) the IT department.
Question
What is an unauthorized data disclosure?
Question
A company establishes data rights and responsibilities and educates employees on how to backup and recover the database.But,The company still needs to address the ___________ safeguards.

A) inadvertent
B) security
C) human
D) data
E) technical
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/88
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Managing Information Security and Privacy
1
When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests,this is called a denial of service attack.
True
2
Despite warnings,users have a tendency to write their passwords on sticky notes next to the computer.
True
3
Denial of service always occurs because of malicious attacks on the system.
False
4
Smart cards are convenient and easy to use since they don't require any PIN numbers for authentication.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
5
Drive-by sniffers take computers with wireless connections through an area and search for unprotected wireless networks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
6
Malware protection is an example of a technical safeguard.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
7
Phishing is when someone sends an e-mail pretending to be a legitimate company and asking for confidential data,such as account numbers.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
8
Care must be taken when terminating employees because they may take harmful and malicious actions.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
9
Malware is used in denial of service attacks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
10
Biometric authentication has been around for some time,and because of weaknesses is not likely to see much usage in the future.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
11
Spoofing is a technique for intercepting computer communications.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
12
Data safeguards are designed to protect computer networks.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
13
A retinal scan would be considered a biometric authentication technique.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
14
Technical safeguards involve the hardware and software components of an information system.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
15
People who intentionally gain unauthorized access to computer systems are called hackers.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
16
Any action,device,procedure,technique,or other measure that reduces a system's vulnerability to a threat is a safeguard.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
17
To protect against lost or sabotaged encryption keys,a trusted party should keep a copy of the key.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
18
Even if a potential new hire will not have access to sensitive data and systems,they should be extensively screened for security purposes.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
19
Encryption is one of several technical safeguards.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
20
Most anti-malware programs check e-mail attachments for malware code.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
21
Organizations should protect sensitive data by storing it in ________ form.

A) compressed
B) secure
C) digital
D) encrypted
E) standardized
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
22
Bloggers have not yet had much of an impact on the main stream media.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
23
Users should scan their computers with anti-malware programs at least

A) once a year.
B) biannually.
C) once a week.
D) daily.
E) once a month.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
24
Backup and recovery,passwords,and encryption are human safeguards.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
25
Following a disaster,hot sites provide office space,but customers themselves must come and provide and install the equipment needed to continue operations.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
26
Be sure and purchase your antispyware program from a(n)________ vendor,because some free programs in the past were actually malware programs in disguise.

A) reasonable
B) reputable
C) entrepreneurial
D) inexpensive
E) illegitimate
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
27
About ninety percent of all viruses are spread via

A) spreadsheets.
B) AOL.
C) technology.
D) network worms.
E) email.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
28
It is possible for some malware to install itself on your computer by you doing nothing more than opening a(n)

A) web page.
B) file.
C) e-mail
D) computer.
E) account.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
29
Because encryption keys can be lost or destroyed,a copy of the key should be stored with a trusted third party called a(n)

A) key account.
B) white-hat hacker.
C) key escrow.
D) authentication certifier.
E) control account.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
30
________ safeguards involve the people and procedure components of information systems.

A) Human
B) Data
C) Technical
D) Malware
E) Firewall
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
31
Organizations should store at least some of the _______________ of the database contents off the premises,possibly in a remote location.

A) backups
B) company information
C) malware definitions
D) smaller parts
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
32
________,which are the patterns that exist in malware code,should be downloaded and updated frequently.

A) Software updates
B) Service packs
C) Malware patterns
D) Network patches
E) Malware definitions
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
33
Hardened web sites use special versions of the operating systems and functions that are not required by the application.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
34
Viruses and worms don't spread very quickly so it is not essential to move cautiously when one is discovered by someone in your organization.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
35
The purpose of a(n)________ is to protect databases and other organizational data.

A) data warehouse
B) data security group
C) operations group
D) data safeguard
E) steering committee
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
36
The best safeguard against a natural disaster is to have a safe location.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
37
Help desks have not been the source of many security problems in the past.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
38
Since most organizations are protected by a(n)________,it is not surprising that most viruses spread via e-mail.

A) data dictionary
B) antivirus program
C) biometric authentication device
D) firewall
E) white-hat hacker
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
39
________ to (for)the physical computers that run the DBMS and all devices that store database data should be carefully controlled.

A) References
B) Access
C) Design plans
D) Connections
E) Documentation
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
40
If you ever receive notification that your password has been reset when you did not request a reset,immediately contact your IS department.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
41
A(n)________ card has a microchip on it that is loaded with identifying data.

A) smart
B) debit
C) credit
D) ATM
E) identity
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
42
________ considerations should be part of the hiring process.

A) Weight
B) Position
C) Gender
D) Age
E) Security
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
43
A ________ is a remote processing centre run by a commercial disaster-recovery service that provides all the equipment needed to continue operations after a disaster.

A) web farm
B) development site
C) cold site
D) hot site
E) server farm
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
44
In order to prioritize their activities and protect an organization from possible risk and loss,security personnel must document the position ________ of all employees.

A) riskiness
B) data access
C) controls
D) level
E) sensitivity
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
45
In order to intercept communications on ________ networks,drive-by sniffers simply drive or walk around with computers with wireless connections.

A) commercial
B) LAN
C) wireless
D) ISP
E) WAN
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
46
________________ is one of the fastest-growing crimes in Canada because it is relatively easy to do.

A) phishing
B) Hacking
C) Spoofing
D) PIPEDA
E) Identity theft
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
47
Because they kept giving out passwords to users who claimed to have forgotten them,________ were a serious security risk in the organization.

A) interns
B) help desks
C) data administrators
D) executives
E) developers
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
48
Firewalls produce ________ of their activities,which include lists of all dropped packets,and attempts to gain unauthorized access.

A) programs
B) logs
C) graphics
D) calls
E) accounts
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
49
Some of the biggest security threats are from ________ employees.

A) disinterested
B) disgruntled
C) self-motivated
D) happy
E) contrarian
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
50
A company should clearly define the security ________ for each position.

A) accounts
B) levels
C) responsibilities
D) backups
E) safeguards
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
51
The existence of ________ user accounts is a serious security threat.

A) unused
B) network
C) meta
D) employee
E) modified
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
52
A(n)________ is someone who pretends to be a legitimate company and sends e-mail requesting confidential data.

A) hacker
B) phisher
C) spoofer
D) hawker
E) employee
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
53
When an employee is terminated,system administrators should receive advance notice so they can

A) plan for security changes.
B) get the employees computer.
C) remove accounts and passwords.
D) fight over the person's office.
E) plan a termination party.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
54
When an employee notices a virus on his machine,the ________ plan should specify what to do.

A) antivirus
B) security
C) technology
D) company
E) incident response
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
55
The best way to safeguard a web site from public users is to ________ the web site against an attack.

A) secure
B) prepare
C) defend
D) harden
E) update
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
56
________ are the primary means of authentication.

A) Encrypted keys
B) Network administrators
C) Passwords
D) Single sign-on
E) Facial scans
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
57
________ is a technique for intercepting computer communications.

A) Spoofing
B) Hacking
C) Pretexting
D) Phishing
E) Sniffing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
58
Computing infrastructure should be located in ________ buildings designed to house expensive and critical equipment.

A) central
B) air-conditioned
C) high-tech
D) fire-resistant
E) easily accessible
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
59
Passwords have weaknesses because users often choose simple passwords,which ________ systems can easily guess.

A) security
B) intrusion
C) antivirus
D) malware
E) biometric
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
60
A hacker can launch a denial of service attack against a web server by ________ it with millions of bogus service requests.

A) programming
B) flooding
C) denying
D) hacking
E) probing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
61
User accounts should be given (the)________ to perform their jobs

A) least possible privileges needed
B) most possible privileges needed
C) administrator privileges
D) user privileges
E) company standard privileges
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
62
According to PIPEDA every organization needs to identify anyone in the organization who is responsible for ___________ personal information.

A) using
B) safeguarding
C) disclosing
D) collecting
E) maintaining
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
63
What is pretexting?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
64
Enforcement consists of ________ interdependent factors.

A) 4
B) 2
C) 5
D) 3
E) 6
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
65
The web site _______________________ lists simple things to do to lower your risk of identity theft.

A) HYPERLINK "http://www.wordpress.com" www.wordpress.com
B) HYPERLINK "http://www.google.ca" www.google.ca
C) HYPERLINK "http://www.safecanada.com" www.safecanada.com
D) HYPERLINK "http://www.priv.gc.da" www.priv.gc.da
E) HYPERLINK "http://www.equifax.com" www.equifax.com
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
66
If you suspect an organization has inappropriately disclosed your personal information to a 3ʳᵈ party,you can lodge a complaint with

A) Industry Canada
B) RCMP
C) the local police.
D) Revenue Canada.
E) Office of the Privacy Commissioner of Canada.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
67
________ is an organization-wide function that is in charge of developing data policies and enforcing data standards.

A) Data contents protection
B) Data safeguarding
C) Data integrity
D) Data administration
E) Data rights administration
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
68
Users often resist biometric identification because they feel it is

A) expensive.
B) ineffective.
C) too technical.
D) invasive.
E) hard to use.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
69
What is phishing?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
70
After installing anti-virus and antispyware,what is the best way to avoid malware?

A) Encrypt your work
B) Give your friend your passwords.
C) Shut the computer down at the end of the day.
D) Open all email by double clicking.
E) Don't open email attachments from unknown sources.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
71
When an incident is reported,________ is (are)of the essence.

A) the response
B) preparation
C) speed
D) a systematic approach
E) actions
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
72
PIPEDA stands for

A) Personal Information Protection and Electronic Disclosure Act.
B) Personal Information Protection and Effective Disclosures Act.
C) Personal Information Protection and Electronic Disclosures Act.
D) Personal Information Protection and Electronic Documents Act.
E) Personal Information Protection and Electronic Disclosure Actions.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
73
A security incident reporting plan should ________ all incident reports.

A) centralize
B) generalize
C) standardize
D) decentralize
E) prioritize
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
74
PIPEDA gives individuals the right to know why an organization is ________ their personal information.

A) collecting and disclosing
B) collecting and changing
C) collecting, using or disclosing
D) changing
E) using and disclosing
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
75
Adware is ________ than spyware.

A) more serious
B) less annoying
C) more malicious
D) more benign
E) harder to get rid of
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
76
Hardening is actually a(n)________ safeguard.

A) technical
B) security
C) data
D) human
E) accountability
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
77
The popularity and efficacy of search engines like Google have created a source of

A) entertainment.
B) inadvertent information disclosure.
C) phishing.
D) pretexting.
E) sniffing.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
78
Security policy establishment is the responsibility of

A) middle managers.
B) the CEO.
C) corporate lawyers.
D) senior management.
E) the IT department.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
79
What is an unauthorized data disclosure?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
80
A company establishes data rights and responsibilities and educates employees on how to backup and recover the database.But,The company still needs to address the ___________ safeguards.

A) inadvertent
B) security
C) human
D) data
E) technical
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 88 flashcards in this deck.