Filters
Question type

Study Flashcards

In a private key system the sender and the receiver have ________,and in the public key system they have ________.


A) different keys; the same key
B) a decrypting algorithm; an encrypting algorithm
C) the same key; two separate keys
D) an encrypting algorithm; a decrypting algorithm

Correct Answer

verifed

verified

If an organization asks you to disclose your social security number,yet fails to properly dispose of your private information once it has fulfilled its purpose,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Management
B) Notice
C) Choice and consent
D) Use and retention

Correct Answer

verifed

verified

After the information that needs to be protected has been identified,what step should be completed next?


A) The information needs to be placed in a secure,central area.
B) The information needs to be encrypted.
C) The information needs to be classified in terms of its value to the organization.
D) The information needs to be depreciated.

Correct Answer

verifed

verified

The first steps in protecting the privacy of personal information is to identify


A) what sensitive information is possessed by the organization.
B) where sensitive information is stored.
C) who has access to sensitive information.
D) All of the above are first steps in protecting privacy.

Correct Answer

verifed

verified

Cindy Vindoolo logged on to her e-mail account to find that she had received 50 e-mails from a company called LifeCo that promised her extreme weight loss if she bought their diet pills.Cindy angrily deleted all 50 e-mails,realizing she was a victim of


A) telemarketing.
B) spam.
C) direct mail.
D) MLM.

Correct Answer

verifed

verified

The system and processes used to issue and manage asymmetric keys and digital certificates are known as


A) asymmetric encryption.
B) certificate authority.
C) digital signature.
D) public key infrastructure.

Correct Answer

verifed

verified

Describe some steps you can take to minimize your risk of identity theft.

Correct Answer

verifed

verified

Shred documents containing personal info...

View Answer

In developing policies related to personal information about customers,Folding Squid Technologies adhered to the Trust Services framework.The standard applicable to these policies is


A) security.
B) confidentiality.
C) privacy.
D) availability.

Correct Answer

verifed

verified

Identify the item below which is not a piece of legislation passed to protect individuals against identity theft or to secure individuals' privacy.


A) the Health Insurance Portability and Accountability Act
B) the Health Information Technology for Economic and Clinical Heath Act
C) the Financial Services Modernization Act
D) the Affordable Care Act

Correct Answer

verifed

verified

Which of the following is not one of the basic actions that an organization must take to preserve the confidentiality of sensitive information?


A) identification of information to be protected
B) backing up the information
C) controlling access to the information
D) training

Correct Answer

verifed

verified

Which type of software blocks outgoing messages containing key words or phrases associated with an organization's sensitive data?


A) anti-virus software
B) data loss prevention software
C) a digital watermark
D) information rights software

Correct Answer

verifed

verified

Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?


A) Provide free credit report monitoring for customers.
B) Inform customers of the option to opt-out of data collection and use of their personal information.
C) Allow customers' browsers to decline to accept cookies.
D) Utilize controls to prevent unauthorized access to,and disclosure of,customers' information.

Correct Answer

verifed

verified

If an organization asks you to disclose your date of birth and your address,but fails to establish any procedures for responding to customer complaints,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Collection
B) Access
C) Security
D) Monitoring and enforcement

Correct Answer

verifed

verified

Classification of confidential information is the responsibility of whom,according to COBIT5?


A) external auditor
B) information owner
C) IT security professionals
D) management

Correct Answer

verifed

verified

If an organization asks you to disclose your date of birth and your address,but refuses to let you review or correct the information you provided,the organization has likely violated which of the Generally Accepted Privacy Principles?


A) Collection
B) Access
C) Security
D) Choice and consent

Correct Answer

verifed

verified

Under CAN-SPAM legislation,an organization that receives an opt-out request from an individual has ________ days to implement steps to ensure they do not send out any additional unsolicited e-mail to the individual again.


A) 2
B) 5
C) 7
D) 10

Correct Answer

verifed

verified

A process that takes plaintext of any length and transforms it into a short code.


A) asymmetric encryption
B) encryption
C) hashing
D) symmetric encryption

Correct Answer

verifed

verified

True or False: Encryption is one of the many ways to protect information in transit over the internet.

Correct Answer

verifed

verified

Information encrypted with the creator's private key that is used to authenticate the sender is


A) asymmetric encryption.
B) digital certificate.
C) digital signature.
D) public key.

Correct Answer

verifed

verified

It is impossible to encrypt information


A) transmitted over the Internet.
B) stored on a hard drive.
C) printed on a report.
D) None of the above

Correct Answer

verifed

verified

Showing 21 - 40 of 51

Related Exams

Show Answer