Deck 12: Privacy and Digital Security

Full screen (f)
exit full mode
Question
Information is generated when a person buys goods or services at a store .
Use Space or
up arrow
down arrow
to flip the card.
Question
The vast majority of business transactions are anonymous .
Question
American privacy laws are much stricter than European privacy laws .
Question
The United States has not adopted the OECD principles .
Question
The United States provides limited enforcement of OECD principles .
Question
A company can place a cookie on your computer even if you've never visited its web site .
Question
A third-party cookie is initiated by a direct request from the user .
Question
Cookies can be used to track your online travels by using ad placement on various web sites .
Question
In contrast to the "omnibus"solution of adopting the OECD list, the United States uses an approach called "sectoral"which means that it passes laws to deal with specific industries (that is, business sectors) or practices .
Question
Messages that are encrypted using a public key RSA129 cryptosystem have, to date, not yet been cracked .
Question
The Do Not Call List was so successful that it has now been applied to email .
Question
Identity theft is the crime of posing as someone else for fraudulent purposes .
Question
Partial backups should be made more often than full backups .
Question
Emptying the Trash on your computer guarantees that the data has been erased .
Question
Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States .
Question
The difference between a worm and a virus is that the worm program rides along with other software, while the virus can actually send itself to other devices on the Internet .
Question
Non European countries that want information on European citizens must show that they have privacy laws consistent with OECD principles .
Question
Opt-in means that a business can use the item selected unless the user explicitly prohibits the new use .
Question
Modern browsers allow the user to control the cookie policy for a computer .
Question
In the United States the protection of an individual's privacy is the responsibility of the U . S . government .
Question
The purpose of encryption is to allow private transmission and storage of sensitive information .
Question
Americans' legal access to a free credit check to learn their credit score and to check for errors applies the Fair Information Practices Guideline points of Purpose and Security .
Question
Personal computers can only be backed up to another hard disk .
Question
Cell phones can be used to track a user's location, even if the GPS is turned off .
Question
Two-factor authentication allows for greater security in user access to web sites .
Question
European privacy standards are closest to the policy called

A) Opt-In
B) Objection
C) No Limits
D) No Uses
Question
American privacy standards are closest to the policy called

A) No Limits
B) Objection
C) No Uses
D) Opt-In
Question
The accuracy of personal information is the responsibility of the

A) individual
B) data controller
C) data collector
D) government
Question
The person in charge of privacy policies and communication with individuals regarding their privacy is the

A) CEO
B) database developer
C) CIO
D) data controller
Question
Spyware

A) is illegal
B) cannot be installed without the user's permission
C) is software that snoops private information
D) All of these
Question
The RSA public key cryptosystem relies on

A) trapdoors
B) key escrow
C) prime numbers
D) All of these
Question
Cookies

A) are stored on a server for use by a client
B) are placed on a server by a client
C) are stored on a client and sent back to a server
D) cannot be removed from a client
Question
Backups on a personal computer

A) should be done daily
B) are just as essential to a personal system as a business system
C) should follow the same pattern of backups as that used by business systems
D) are not needed
Question
The most important consideration in a disaster recovery plan is to

A) always print your data
B) have a backup of your data
C) never trust the computer to store your files
D) All of these
Question
The OECD privacy principles were developed in

A) 1980
B) 1960
C) 2001
D) 1949
Question
Which OECD principle states that personal data should be protected by reasonable security measures against risks of disclosure, unauthorized access, misuse, modification, destruction, or loss?

A) Limited Collection Principle
B) Openness Principle
C) Use Limitation Principle
D) Security Principle
Question
A cookie contains information stored in

A) seven fields
B) a database
C) one byte
D) eight bytes
Question
A combination of encryption and decryption methods is a

A) cookie
B) cryptosystem
C) secure transaction
D) digital encryption system
Question
When the Send button is clicked to send an email

A) two copies of the message are produced
B) the message is backed up on a server
C) the message is immediately deleted from the sender's computer
D) the sender retains full control over the message
Question
United States companies that operate in the EU

A) must apply EU rules to all customer data no matter where the customer lives
B) must handle EU customer data under rules negotiated between the US and the EU
C) are not required to follow EU privacy law
D) cannot retain any customer data since there is no way to do so under both sets of laws
Question
The United States' approach of passing separate laws to govern privacy in specific industries or activities is called a(n) ________ approach .

A) individualized
B) divided
C) sectoral
D) random
Question
The most important advantage of public key encryption over private key is that

A) it can be easily performed by modern computer equipment
B) the encryption algorithm itself is kept carefully secret by the government
C) prime numbers are used in the encryption process
D) it doesn't matter if the "bad guys" find out the key used to encrypt messages
Question
A web page is transmitted securely when the protocol part of the URL is

A) http
B) secure
C) https
D) used with a lock icon next to the URL
Question
Which of the following may be used in a two-step authentication process?

A) two forms of biometric identification
B) two physical keys
C) two passwords
D) Any of these
Question
Select all that apply . Personal information can be tracked by

A) cookies
B) chip ID numbers
C) cell phone use
D) IP addresses
Question
Select all that apply . Which of the following can accurately complete the following sentence:If you disable cookies on your computer

A) you won't be able to see anything on the web site that has those cookies
B) you won't be able to enable cookies again on that computer
C) all cookies, including third-party cookies, will be blocked
D) you won't be able to perform most online transactions
Question
Select all that apply . Personal backups are not critical for

A) anything essential if you already have printed it
B) software programs
C) information that has been backed up but not changed
D) unimportant files
Question
Select all that apply . Which of the following activities creates an unnecessary risk of being hacked?

A) clicking on a bank's URL instead of typing it in
B) responding through email to requests for personal information
C) sending information to a web site that doesn't use encryption
D) using email to write a letter to a friend
Question
Select all that apply . Which of the following may result from malware?

A) Secure information may be obtained from your computer .
B) Contents on your hard drive may be erased .
C) Spam may be sent from your computer .
D) Backdoors may be created .
Question
Select all that apply . Which of the following are options that may be chosen in a two-factor authentication plan?

A) something the user is (like a fingerprint)
B) something the user calculates (like a math problem)
C) something the user possesses (like a key)
D) something the user knows (like a password)
Question
Most Americans wrongly assume that their privacy regarding business information is restricted to ________ .
Question
A(n) ________ is information that is stored on a client computer by an HTTP server computer .
Question
________ is the process of recovering encrypted cipher text .
Question
Malware that directly manipulates operating system tables to hide its presence is known as a ________ .
Question
A message exchange in which the content is encrypted to keep it private is known as ________ communication .
Question
The crime of posing as someone else for fraudulent purposes is ________ .
Question
The ________ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used and should be accurate, complete, and up-to-date .
Question
When a web site automatically sends details about your visit to that site to other providers, this is known as ________ .
Question
The type of key published by the receiver and used by the sender to encrypt messages is the ________ key .
Question
Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be made more secure by ________ the size of the key .
Question
Software intended to do harm to a computer that is connected to the Internet is called ________ .
Question
The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms .
Question
In computer security, compromised computers that act under the direction of an external master computer are referred to as ________ .
Question
Recovery after a disaster involves installing the most recent ________ backup copy .
Question
Information that is recorded to hide its true meaning uses ________ .
Question
A benign-sounding software download which performs malicious activities is called a ________ .
Question
A program that creates an access path through which attackers can run any program they want is called a ________ .
Question
The right to block or limit online information about offenses that took place very long ago or accusations that have been disproven is called the right to be ________ .
Question
The type of authentication that combines two things out of three possibilities, rather than just a single password, to allow a user access is known as ________ authentication .
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Privacy and Digital Security
1
Information is generated when a person buys goods or services at a store .
True
2
The vast majority of business transactions are anonymous .
False
3
American privacy laws are much stricter than European privacy laws .
False
4
The United States has not adopted the OECD principles .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
The United States provides limited enforcement of OECD principles .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
A company can place a cookie on your computer even if you've never visited its web site .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
A third-party cookie is initiated by a direct request from the user .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
Cookies can be used to track your online travels by using ad placement on various web sites .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
In contrast to the "omnibus"solution of adopting the OECD list, the United States uses an approach called "sectoral"which means that it passes laws to deal with specific industries (that is, business sectors) or practices .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
Messages that are encrypted using a public key RSA129 cryptosystem have, to date, not yet been cracked .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
The Do Not Call List was so successful that it has now been applied to email .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
Identity theft is the crime of posing as someone else for fraudulent purposes .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
Partial backups should be made more often than full backups .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
Emptying the Trash on your computer guarantees that the data has been erased .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
The difference between a worm and a virus is that the worm program rides along with other software, while the virus can actually send itself to other devices on the Internet .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
Non European countries that want information on European citizens must show that they have privacy laws consistent with OECD principles .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
Opt-in means that a business can use the item selected unless the user explicitly prohibits the new use .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Modern browsers allow the user to control the cookie policy for a computer .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
In the United States the protection of an individual's privacy is the responsibility of the U . S . government .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
The purpose of encryption is to allow private transmission and storage of sensitive information .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
Americans' legal access to a free credit check to learn their credit score and to check for errors applies the Fair Information Practices Guideline points of Purpose and Security .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
Personal computers can only be backed up to another hard disk .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
Cell phones can be used to track a user's location, even if the GPS is turned off .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
Two-factor authentication allows for greater security in user access to web sites .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
European privacy standards are closest to the policy called

A) Opt-In
B) Objection
C) No Limits
D) No Uses
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
American privacy standards are closest to the policy called

A) No Limits
B) Objection
C) No Uses
D) Opt-In
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
The accuracy of personal information is the responsibility of the

A) individual
B) data controller
C) data collector
D) government
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
The person in charge of privacy policies and communication with individuals regarding their privacy is the

A) CEO
B) database developer
C) CIO
D) data controller
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Spyware

A) is illegal
B) cannot be installed without the user's permission
C) is software that snoops private information
D) All of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
The RSA public key cryptosystem relies on

A) trapdoors
B) key escrow
C) prime numbers
D) All of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
Cookies

A) are stored on a server for use by a client
B) are placed on a server by a client
C) are stored on a client and sent back to a server
D) cannot be removed from a client
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Backups on a personal computer

A) should be done daily
B) are just as essential to a personal system as a business system
C) should follow the same pattern of backups as that used by business systems
D) are not needed
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
The most important consideration in a disaster recovery plan is to

A) always print your data
B) have a backup of your data
C) never trust the computer to store your files
D) All of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
The OECD privacy principles were developed in

A) 1980
B) 1960
C) 2001
D) 1949
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
Which OECD principle states that personal data should be protected by reasonable security measures against risks of disclosure, unauthorized access, misuse, modification, destruction, or loss?

A) Limited Collection Principle
B) Openness Principle
C) Use Limitation Principle
D) Security Principle
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
A cookie contains information stored in

A) seven fields
B) a database
C) one byte
D) eight bytes
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
A combination of encryption and decryption methods is a

A) cookie
B) cryptosystem
C) secure transaction
D) digital encryption system
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
When the Send button is clicked to send an email

A) two copies of the message are produced
B) the message is backed up on a server
C) the message is immediately deleted from the sender's computer
D) the sender retains full control over the message
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
United States companies that operate in the EU

A) must apply EU rules to all customer data no matter where the customer lives
B) must handle EU customer data under rules negotiated between the US and the EU
C) are not required to follow EU privacy law
D) cannot retain any customer data since there is no way to do so under both sets of laws
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
The United States' approach of passing separate laws to govern privacy in specific industries or activities is called a(n) ________ approach .

A) individualized
B) divided
C) sectoral
D) random
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
The most important advantage of public key encryption over private key is that

A) it can be easily performed by modern computer equipment
B) the encryption algorithm itself is kept carefully secret by the government
C) prime numbers are used in the encryption process
D) it doesn't matter if the "bad guys" find out the key used to encrypt messages
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
A web page is transmitted securely when the protocol part of the URL is

A) http
B) secure
C) https
D) used with a lock icon next to the URL
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following may be used in a two-step authentication process?

A) two forms of biometric identification
B) two physical keys
C) two passwords
D) Any of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
Select all that apply . Personal information can be tracked by

A) cookies
B) chip ID numbers
C) cell phone use
D) IP addresses
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Select all that apply . Which of the following can accurately complete the following sentence:If you disable cookies on your computer

A) you won't be able to see anything on the web site that has those cookies
B) you won't be able to enable cookies again on that computer
C) all cookies, including third-party cookies, will be blocked
D) you won't be able to perform most online transactions
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Select all that apply . Personal backups are not critical for

A) anything essential if you already have printed it
B) software programs
C) information that has been backed up but not changed
D) unimportant files
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
Select all that apply . Which of the following activities creates an unnecessary risk of being hacked?

A) clicking on a bank's URL instead of typing it in
B) responding through email to requests for personal information
C) sending information to a web site that doesn't use encryption
D) using email to write a letter to a friend
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
Select all that apply . Which of the following may result from malware?

A) Secure information may be obtained from your computer .
B) Contents on your hard drive may be erased .
C) Spam may be sent from your computer .
D) Backdoors may be created .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
Select all that apply . Which of the following are options that may be chosen in a two-factor authentication plan?

A) something the user is (like a fingerprint)
B) something the user calculates (like a math problem)
C) something the user possesses (like a key)
D) something the user knows (like a password)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Most Americans wrongly assume that their privacy regarding business information is restricted to ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) ________ is information that is stored on a client computer by an HTTP server computer .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
________ is the process of recovering encrypted cipher text .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
Malware that directly manipulates operating system tables to hide its presence is known as a ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
A message exchange in which the content is encrypted to keep it private is known as ________ communication .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
The crime of posing as someone else for fraudulent purposes is ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
The ________ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used and should be accurate, complete, and up-to-date .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
When a web site automatically sends details about your visit to that site to other providers, this is known as ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
The type of key published by the receiver and used by the sender to encrypt messages is the ________ key .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be made more secure by ________ the size of the key .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Software intended to do harm to a computer that is connected to the Internet is called ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
In computer security, compromised computers that act under the direction of an external master computer are referred to as ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
Recovery after a disaster involves installing the most recent ________ backup copy .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Information that is recorded to hide its true meaning uses ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
A benign-sounding software download which performs malicious activities is called a ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
A program that creates an access path through which attackers can run any program they want is called a ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
The right to block or limit online information about offenses that took place very long ago or accusations that have been disproven is called the right to be ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
The type of authentication that combines two things out of three possibilities, rather than just a single password, to allow a user access is known as ________ authentication .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 69 flashcards in this deck.