Chapter 6 - Privacy (Q&A)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is not an issue raised regarding how private data is gathered and used? A. By law all encrypted data must contain a "backdoor" entry point. B. The data is gathered and kept in secret. C. Informed consent is usually missing or is misunderstood. D. The accuracy of the data cannot be verified.

A. By law all encrypted data must contain a "backdoor" entry point.

Which of these is NOT a method for encryption through software? A. Encrypt using a separate hardware computer chip B. Encrypt using the file system C. Whole disk encryption D. Encrypt individual files

A. Encrypt using a separate hardware computer chip

Each of these is a responsibility of an organization regarding user private data EXCEPT: A. Keep personal information for no longer than 365 days. B. Do not use personal information when it is not necessary C. Collect only necessary personal information. D. Use industry-tested and accepted methods.

A. Keep personal information for no longer than 365 days.

A digital signature can provide each of the following benefits EXCEPT ______. A. verify the receiver B. verify the sender C. prove the integrity of the message D. enforce nonrepudiation

A. verify the receiver

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

Which of the following is NOT a privacy best practice? A. Use strong passwords on all accounts that contain personal information. B. Carry your Social Security number with you so that it cannot be stolen you are not home. C. Shred financial documents and paperwork that contains personal information before discarding it. D. Use the private browsing option in your web browser.

B. Carry your Social Security number with you so that it cannot be stolen you are not home.

Which of the following is not a risk associated with the use of private data? A. Associations with groups. B. Devices being infected with malware. C. Statistical inferences. D. Individual inconveniences and identity theft.

B. Devices being infected with malware.

Which of these is NOT a characteristic of a secure hash algorithm? A. The results of a hash function should not be reversed. B. The hash should always be the same fixed size. C. Collisions should be rare. D. A message cannot be produced from a predefined hash.

C. Collisions should be rare.

What is the most important advantage of hardware encryption over software encryption? A. Software encryption cannot be used on older computers. B. Hardware encryption is up to ten times faster than software encryption. C. There are no advantages of hardware encryption over software encryption. D. Software that performs encryption can be subject to attacks.

D. Software that performs encryption can be subject to attacks.

The areas of a file in which steganography can hide data include all of the following EXCEPT _____. A. in data that is used to describe the content or structure of the actual data B. in the file header fields that describe the file C. in areas that contain the content data itself D. in the directory structure of the file system

D. in the directory structure of the file system

Which of these is NOT a basic security protection for information that cryptography can provide? A. authenticity B. confidentiality C. integrity D. risk loss

D. risk loss

A(n) _____ is not decrypted but is only used for comparison purposes.

Digest

What is ciphertext?

Encrypted data.

Which of the following is "one-way" so that its contents cannot be used to reveal the original set of data?

Hash

Proving that a user sent an email message is known as _____.

Nonrepudiation

Which of the following appears in the web browser when you are connected to a secure website that is using a digital certificate?

Padlock

_____ hides the existence of the data.

Steganography

How many keys are used in asymmetric cryptography?

Two

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Each of the following is true about privacy EXCEPT: A. Today individuals can achieve any level of privacy that is desired. B. Privacy is freedom from attention, observation, or interference based on your decision. C. Privacy is the right to be left alone to the degree that you choose. D. Privacy is difficult due to the volume of data silently accumulated by technology.

A. Today individuals can achieve any level of privacy that is desired.


Kaugnay na mga set ng pag-aaral

newborn assessment part 1. Part 2 is newborn care

View Set

AP Gov Court Case Flashcards Chris Lovre

View Set

Computer Forensics - Chapter 3 Review Questions

View Set

Module 20: Basic Learning Concepts and Classical Conditioning

View Set

Grado 12: comentarios después de los orales

View Set