Deck 12: Privacy and Digital Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
Play
Full screen (f)
Deck 12: Privacy and Digital Security
1
Information is generated when a person buys goods or services at a store .
True
2
The vast majority of business transactions are anonymous .
False
3
American privacy laws are much stricter than European privacy laws .
False
4
The United States has not adopted the OECD principles .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
The United States provides limited enforcement of OECD principles .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
A company can place a cookie on your computer even if you've never visited its web site .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
A third-party cookie is initiated by a direct request from the user .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
Cookies can be used to track your online travels by using ad placement on various web sites .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
In contrast to the "omnibus"solution of adopting the OECD list, the United States uses an approach called "sectoral"which means that it passes laws to deal with specific industries (that is, business sectors) or practices .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
Messages that are encrypted using a public key RSA129 cryptosystem have, to date, not yet been cracked .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
The Do Not Call List was so successful that it has now been applied to email .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
Identity theft is the crime of posing as someone else for fraudulent purposes .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
Partial backups should be made more often than full backups .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
Emptying the Trash on your computer guarantees that the data has been erased .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
The difference between a worm and a virus is that the worm program rides along with other software, while the virus can actually send itself to other devices on the Internet .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
Non European countries that want information on European citizens must show that they have privacy laws consistent with OECD principles .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
Opt-in means that a business can use the item selected unless the user explicitly prohibits the new use .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Modern browsers allow the user to control the cookie policy for a computer .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
In the United States the protection of an individual's privacy is the responsibility of the U . S . government .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
The purpose of encryption is to allow private transmission and storage of sensitive information .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
Americans' legal access to a free credit check to learn their credit score and to check for errors applies the Fair Information Practices Guideline points of Purpose and Security .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
Personal computers can only be backed up to another hard disk .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
Cell phones can be used to track a user's location, even if the GPS is turned off .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
Two-factor authentication allows for greater security in user access to web sites .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
European privacy standards are closest to the policy called
A) Opt-In
B) Objection
C) No Limits
D) No Uses
A) Opt-In
B) Objection
C) No Limits
D) No Uses
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
American privacy standards are closest to the policy called
A) No Limits
B) Objection
C) No Uses
D) Opt-In
A) No Limits
B) Objection
C) No Uses
D) Opt-In
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
The accuracy of personal information is the responsibility of the
A) individual
B) data controller
C) data collector
D) government
A) individual
B) data controller
C) data collector
D) government
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
The person in charge of privacy policies and communication with individuals regarding their privacy is the
A) CEO
B) database developer
C) CIO
D) data controller
A) CEO
B) database developer
C) CIO
D) data controller
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Spyware
A) is illegal
B) cannot be installed without the user's permission
C) is software that snoops private information
D) All of these
A) is illegal
B) cannot be installed without the user's permission
C) is software that snoops private information
D) All of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
The RSA public key cryptosystem relies on
A) trapdoors
B) key escrow
C) prime numbers
D) All of these
A) trapdoors
B) key escrow
C) prime numbers
D) All of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
Cookies
A) are stored on a server for use by a client
B) are placed on a server by a client
C) are stored on a client and sent back to a server
D) cannot be removed from a client
A) are stored on a server for use by a client
B) are placed on a server by a client
C) are stored on a client and sent back to a server
D) cannot be removed from a client
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Backups on a personal computer
A) should be done daily
B) are just as essential to a personal system as a business system
C) should follow the same pattern of backups as that used by business systems
D) are not needed
A) should be done daily
B) are just as essential to a personal system as a business system
C) should follow the same pattern of backups as that used by business systems
D) are not needed
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
The most important consideration in a disaster recovery plan is to
A) always print your data
B) have a backup of your data
C) never trust the computer to store your files
D) All of these
A) always print your data
B) have a backup of your data
C) never trust the computer to store your files
D) All of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
The OECD privacy principles were developed in
A) 1980
B) 1960
C) 2001
D) 1949
A) 1980
B) 1960
C) 2001
D) 1949
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
Which OECD principle states that personal data should be protected by reasonable security measures against risks of disclosure, unauthorized access, misuse, modification, destruction, or loss?
A) Limited Collection Principle
B) Openness Principle
C) Use Limitation Principle
D) Security Principle
A) Limited Collection Principle
B) Openness Principle
C) Use Limitation Principle
D) Security Principle
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
A cookie contains information stored in
A) seven fields
B) a database
C) one byte
D) eight bytes
A) seven fields
B) a database
C) one byte
D) eight bytes
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
A combination of encryption and decryption methods is a
A) cookie
B) cryptosystem
C) secure transaction
D) digital encryption system
A) cookie
B) cryptosystem
C) secure transaction
D) digital encryption system
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
When the Send button is clicked to send an email
A) two copies of the message are produced
B) the message is backed up on a server
C) the message is immediately deleted from the sender's computer
D) the sender retains full control over the message
A) two copies of the message are produced
B) the message is backed up on a server
C) the message is immediately deleted from the sender's computer
D) the sender retains full control over the message
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
United States companies that operate in the EU
A) must apply EU rules to all customer data no matter where the customer lives
B) must handle EU customer data under rules negotiated between the US and the EU
C) are not required to follow EU privacy law
D) cannot retain any customer data since there is no way to do so under both sets of laws
A) must apply EU rules to all customer data no matter where the customer lives
B) must handle EU customer data under rules negotiated between the US and the EU
C) are not required to follow EU privacy law
D) cannot retain any customer data since there is no way to do so under both sets of laws
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
The United States' approach of passing separate laws to govern privacy in specific industries or activities is called a(n) ________ approach .
A) individualized
B) divided
C) sectoral
D) random
A) individualized
B) divided
C) sectoral
D) random
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
The most important advantage of public key encryption over private key is that
A) it can be easily performed by modern computer equipment
B) the encryption algorithm itself is kept carefully secret by the government
C) prime numbers are used in the encryption process
D) it doesn't matter if the "bad guys" find out the key used to encrypt messages
A) it can be easily performed by modern computer equipment
B) the encryption algorithm itself is kept carefully secret by the government
C) prime numbers are used in the encryption process
D) it doesn't matter if the "bad guys" find out the key used to encrypt messages
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
A web page is transmitted securely when the protocol part of the URL is
A) http
B) secure
C) https
D) used with a lock icon next to the URL
A) http
B) secure
C) https
D) used with a lock icon next to the URL
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following may be used in a two-step authentication process?
A) two forms of biometric identification
B) two physical keys
C) two passwords
D) Any of these
A) two forms of biometric identification
B) two physical keys
C) two passwords
D) Any of these
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
Select all that apply . Personal information can be tracked by
A) cookies
B) chip ID numbers
C) cell phone use
D) IP addresses
A) cookies
B) chip ID numbers
C) cell phone use
D) IP addresses
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Select all that apply . Which of the following can accurately complete the following sentence:If you disable cookies on your computer
A) you won't be able to see anything on the web site that has those cookies
B) you won't be able to enable cookies again on that computer
C) all cookies, including third-party cookies, will be blocked
D) you won't be able to perform most online transactions
A) you won't be able to see anything on the web site that has those cookies
B) you won't be able to enable cookies again on that computer
C) all cookies, including third-party cookies, will be blocked
D) you won't be able to perform most online transactions
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Select all that apply . Personal backups are not critical for
A) anything essential if you already have printed it
B) software programs
C) information that has been backed up but not changed
D) unimportant files
A) anything essential if you already have printed it
B) software programs
C) information that has been backed up but not changed
D) unimportant files
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
Select all that apply . Which of the following activities creates an unnecessary risk of being hacked?
A) clicking on a bank's URL instead of typing it in
B) responding through email to requests for personal information
C) sending information to a web site that doesn't use encryption
D) using email to write a letter to a friend
A) clicking on a bank's URL instead of typing it in
B) responding through email to requests for personal information
C) sending information to a web site that doesn't use encryption
D) using email to write a letter to a friend
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
Select all that apply . Which of the following may result from malware?
A) Secure information may be obtained from your computer .
B) Contents on your hard drive may be erased .
C) Spam may be sent from your computer .
D) Backdoors may be created .
A) Secure information may be obtained from your computer .
B) Contents on your hard drive may be erased .
C) Spam may be sent from your computer .
D) Backdoors may be created .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
Select all that apply . Which of the following are options that may be chosen in a two-factor authentication plan?
A) something the user is (like a fingerprint)
B) something the user calculates (like a math problem)
C) something the user possesses (like a key)
D) something the user knows (like a password)
A) something the user is (like a fingerprint)
B) something the user calculates (like a math problem)
C) something the user possesses (like a key)
D) something the user knows (like a password)
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Most Americans wrongly assume that their privacy regarding business information is restricted to ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) ________ is information that is stored on a client computer by an HTTP server computer .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
________ is the process of recovering encrypted cipher text .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
Malware that directly manipulates operating system tables to hide its presence is known as a ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
A message exchange in which the content is encrypted to keep it private is known as ________ communication .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
The crime of posing as someone else for fraudulent purposes is ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
The ________ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used and should be accurate, complete, and up-to-date .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
When a web site automatically sends details about your visit to that site to other providers, this is known as ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
The type of key published by the receiver and used by the sender to encrypt messages is the ________ key .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be made more secure by ________ the size of the key .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
Software intended to do harm to a computer that is connected to the Internet is called ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
In computer security, compromised computers that act under the direction of an external master computer are referred to as ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
Recovery after a disaster involves installing the most recent ________ backup copy .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
Information that is recorded to hide its true meaning uses ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
A benign-sounding software download which performs malicious activities is called a ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
A program that creates an access path through which attackers can run any program they want is called a ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
The right to block or limit online information about offenses that took place very long ago or accusations that have been disproven is called the right to be ________ .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
The type of authentication that combines two things out of three possibilities, rather than just a single password, to allow a user access is known as ________ authentication .
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck