14.3.10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following laws was designed to protect a child's information on the internet?

COPPA

When you dispose of a computer or sell used hardware, it is crucial that none of the data on the hard disks can be recovered. Which of the following actions can you take to ensure that no data is recoverable?

Damage the hard disks so badly that all data remanence is gone.

Which of the following is the LEAST reliable means of cleaning or purging media?

Degaussing

Which of the following government acts protects medical records and personal health information?

HIPAA

Your organization has discovered that an overseas company has reverse-engineered and copied your main product and is now selling a counterfeit version. Which of the following BEST describes the type of consequence your organization has suffered?

IP theft

If you lose your wallet or purse and it ends up in the wrong hands, several pieces of information could be used to do personal harm to you. These pieces of information include the following: Name and address Driver license number Credit card numbers Date of birth Which of the following classifications does this information fall into?

Personally identifiable information (PII)

HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect?

Privacy

Which of the following data destruction techniques uses a punch press or hammer system to crush a hard disk?

Pulverizing

Your organization has suffered a data breach, and it was made public. As a result, stock prices have fallen, as consumers no longer trust the organization. Which of the following BEST describes the type of consequence your organization has suffered due to the breach?

Reputation damage

The government and military use the following information classification system: Unclassified Sensitive But Unclassified Confidential Secret Top Secret Drag each classification on the left to the appropriate description on the right.

The lowest level of classified information used by the military. Release of this information could cause damage to military efforts. Confidential If this information is released, it poses grave consequences to national security. Top Secret This information can be accessed by the public and poses no security threat. Unclassified If this information is disclosed, it could cause some harm, but not a national disaster. Sensitive But Unclassified If this information is disclosed, it could cause severe and permanent damage to military actions. Secret


Ensembles d'études connexes

Nat's MIS 111 Lab Final Study Guide

View Set

Resume Questions (Apartment Management)

View Set

Domain 3.0 Security Architecture Assessment

View Set

PoR CH 10 REAL ESTATE CONTRACT LAW

View Set

Dynamic Christian Living Lesson 17: Prerequisites for Answered Prayer

View Set