Multiple Choice
The first steps in protecting the privacy of personal information is to identify
A) what sensitive information is possessed by the organization.
B) where sensitive information is stored.
C) who has access to sensitive information.
D) All of the above are first steps in protecting privacy.
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Identify the last step in protecting the
Q3: Data masking is also referred to as<br>A)encryption.<br>B)tokenization.<br>C)captcha.<br>D)cookies.
Q4: If an organization asks you to disclose
Q5: Identify the first step in protecting the
Q6: Which type of software blocks outgoing messages
Q7: Encryption has a remarkably long and varied
Q8: Describe symmetric encryption and identify three limitations.
Q9: Which of the following is not one
Q10: Identify the type of information below that
Q11: Identify one weakness of encryption below.<br>A)Encrypted packets