ITN 267

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Payment Card Industry Standard includes ________ categories of security requirements.

12

How many representatives are in the U.S. House of Representatives? A. 100 B. 1,000 C.435 D. 400 E. 50

435

The OECD privacy protection guidelines contain ________ privacy principles.

8

The U.S. Supreme Court has ________ justices.

9

There are ________ federal district courts.

94

What is a customer? A. A consumer with a past relationship with a financial institution B. A consumer with no relationship with a financial institution C. A consumer with a continuing relationship with a financial institution D. A consumer who wants to enter into a relationship with a financial institution E. None of the above

A consumer with a continuing relationship with a financial institution

To monitor telephone conversations, an employer must use equipment provided by a phone system service provider and have ________.

A legitimate business reason

What is a mantrap? A. A method to control access to a secure area B. A removable cover that allows access to underground utilities C. A logical access control mechanism D. An administrative safeguard E. None of the above

A method to control access to a secure area

What is a Web beacon? A. Text stored on a computer user's hard drive B. A small, invisible electronic file C. A pop-up advertisement D. Executable code E. A data trail left by a computer user

A small, invisible electronic file

Which of the following is an accidental threat? A. A backdoor into a computer system B. A hacker C. A well-meaning employee who inadvertently deletes a file D. An improperly redacted document E. A poorly written policy

A well-meaning employee who inadvertently deletes a file

A written information security program under the Safeguards Rule must include ________. A. Technical safeguards B. Physical safeguards C. Administrative safeguards D. A designated employee to run the program E. All of the above

All of the above

What are consumer goods? A. Items purchased for personal use B. Items purchased for family use C. Items purchased for household use D. All of the above E. None of the above

All of the above

Which of the following are vulnerability classifications? A. People B. Process C. Technology D. Facility E. All of the above

All the above

What is a Red Flag? A. A crime B. An activity that prevents identity theft C. An activity that might indicate identity theft D. An activity that mitigates identity theft E. None of the above

An activity that might indicate identity theft

What is common law? A. A system of law inherited from England B. A system of law inherited from France C. A system of law that relies upon established legal principles and traditions D. Answers B and C E. Answers A and C

Answers A and C

The Data Quality Principle

Any data collected must be correct.

What article of the U.S. Constitution sets forth the powers of the president? A. Article V B. Article IV C. Article III D. Article II E. Article I

Article II

What information security goal does a DoS attack harm? A. Confidentiality B. Integrity C. Authentication D. Availability E. Privacy

Availability

What are the goals of an information security program? A. Authorization, integrity, and confidentiality B. Availability, authorization, and integrity C. Availability, integrity, and confidentiality D. Availability, integrity, and safeguards E. Access control, confidentiality, and safeguards

Availability, integrity, and confidentiality

What is procedural law? A. Branches of law that deal with property cases B. Branches of law that set forth the structure of the judiciary system C. Branches of law that deal with following precedent D. Branches of law that deal with processes that courts use to decide cases E. None of the above

Branches of law that deal with processes that courts use to decide cases

. What techniques are used to create a list of the Web pages that a computer user visits? A. Adware, malware, and phishing B. Malware, cookies, and Web beacons C. Web beacons, clickstreams, and spyware D. Malware, spyware, and cookies E. Clickstreams, cookies, and Web beacons

Clickstreams, cookies, and Web beacons

What are the classification levels for U.S. national security information? A. Public, Sensitive, Restricted B. Confidential, Secret, Top Secret C. Confidential, Restricted, Top Secret D. Public, Secret, Top Secret E. Public, Sensitive, Secret

Confidential, Secret, Top Secret

A federal agency is granted its authority by ________

Congress

The Use Limitation Principle

Data should be used only for the purposes stated when it was collected.

Which of the following is not a privacy tort? A. Intrusion into seclusion B. Portrayal in a false light C. Appropriation of likeness or identity D. Defamation E. Public disclosure of private facts

Defamation

. Which of the following is not a type of security safeguard? A. Corrective B. Preventive C. Detective D. Physical E. Defective

Defective

First-party cookies

Exchanged between a user's browser and the Web site the user is visiting.

The Payment Card Industry Standards are enforced by the Federal Trade Commission. A. True B. False

False

Compliance is ________, audit is ________. A. Following the rules, verifying that the rules were followed B. Verifying that the rules were followed, following the rules C. Making the rules, enforcing the rules D. Forcing the rules, making the rules E. None of the above

Following the rules, verifying that the rules were followed

Which amendment protects against unreasonable searches and seizures? A. First B. Third C. Fourth D. Fifth E. Seventh

Fourth

Which of the following is an example of a model for implementing safeguards? A. ISO/IEC 27002 B. NIST SP 80-553 C. NIST SP 800-3 D. ISO/IEC 20072 E. ISO/IEC 70022

ISO/IEC 27002

The Federal Trade Commission is which type of federal agency? A. Independent B. Subordinate C. Coordinate D. Executive E. Congressional

Independent

The Collection Limitation Principle

Individuals must know about and consent to the collection of their data.

15. What is used to ensure privacy? A. Biometric data B. Encryption C. Information security D. Monitoring E. Online profiling

Information security

Why is biometric data unique? A. It can be used to identify a person. B. It is data about a person's physical traits. C. It can be used to commit identity theft. D. It can't easily be changed. E. None of the above

It can't easily be changed.

Which safeguard is most likely violated if a system administrator logs into an administrator user account in order to surf the Internet and download music files? A. Need to know B. Access control C. Least privilege principle D. Using best available path E. Separation of duties

Least privilege principle

A technical safeguard is also known as a ________.

Logical control

The ________ established the national banking system in the United States.

National Bank Act of 1864

What customer option must be included in a privacy practices notice? A. Disclosure B. Opt-out C. Opt-in D. Notice E. None of the above

Opt-out

The Openness Principle

People can contact the entity collecting their data. People can discover where their personal data is collected and stored.

The Individual Participation Principle

People must know if data about them has been collected. People also must have access to their collected information.

which of the following is nonpublic personal information? A. Personally identifiable financial information provided by a customer to a financial institution B. Personally identifiable financial information provided by a financial institution to a customer C. Personally identifiable financial information provided by a financial institution to an affiliate D. Personally identifiable financial information provided by an affiliate to a financial institution E. Personally identifiable financial information provided by an affiliate to a customer

Personally identifiable financial information provided by a customer to a financial institution

Which of the following isn't a threat classification? A. Human B. Natural C. Process D. Technology and Operational E. Physical and Environmental

Process

An organization obtains an insurance policy against cybercrime. What type of risk response is this? A. Risk mitigation B. Residual risk C. Risk elimination D. Risk transfer E. Risk management

Risk transfer

An employee can add other employees to the payroll database. The same person also can change all employee salaries and print payroll checks for all employees. What safeguard should you implement to make sure that this employee doesn't engage in wrongdoing? A. Need to know B. Access control lists C. Technical safeguards D. Mandatory vacation E. Separation of duties

Separation of duties

Third-party cookies

Set by one Web site but readable by another site. Third-party cookies are set when the Web page a user visits has content on it that is hosted by another server.

Pretexting is also called ________.

Social engineering

The doctrine of precedent is also known as ________.

Stare decisis

What does a seal program verify? A. That an organization meets recognized privacy principles B. That an organization misfits recognized security principles C. That a third party is trusted D. That a Web site does not use cookies

That an organization meets recognized privacy principles

Which U.S. Constitution clause describes Congress' authority to regulate trade between states? A. The Supremacy Clause B. The Necessary and Proper Clause C. The Limitation of Powers Clause D. The Commerce Clause E. The Impeachment Clause

The Commerce Clause

What is the organization that promotes uniform reports among federal banking institutions? A. The Fed B. The FFIEC C. The FTC D. The NCUA E. The SEC

The FFIEC

Which of the following is not a federal bank regulatory agency? A. The FDIC B. The NCUA C. The FTC D. The OCC E. The Fed

The FTC

What is the central bank of the United States? A. The FDIC B. The Fed C. The NCUA D. The OCC E. The CFPB

The Fed or Federal Reserve System

Which federal agency regulates national banks? A. The Office of the Comptroller of the Currency B. The Federal Reserve System C. The Federal Deposit Insurance Corporation D. The Consumer Financial Protection Bureau E. The Federal Trade Commission

The Office of the Comptroller of the Currency

Which rule is not a GLBA consumer protection provision? A. The Safeguards Rule B. The Red Flags Rule C. The Privacy Rule D. The Pretexting Rule E. None of the above

The Red Flags Rule

What is the source of legal authority for the U.S. government? A. The United States Code B. The common law C. Supreme Court decisions D. The U.S. Constitution E. The Declaration of Independence

The U.S. Constitution

What is the U.S. federal court of last resort? A. The U.S. Supremacy Court B The U.S. District Court C. The Ninth Circuit Court of Appeals D. The Federal Court of Appeals E. The U.S. Supreme Court

The U.S. Supreme Court

The Security Safeguards Principle

The collected data must be protected from unauthorized access

The Accountability Principle

The entity collecting data must be held accountable for following the privacy principles

What is the window of vulnerability? A. The period between the discovery of a vulner-ability and mitigation of the vulnerability B. The period between the discovery of a vulner-ability and exploiting the vulnerability C. The period between exploiting a vulnerability and mitigating the vulnerability D. The period between exploiting a vulnerability and eliminating the vulnerability E. A broken window

The period between the discovery of a vulner-ability and mitigation of the vulnerability

What is judicial review? A. The power of courts to review the decisions of other courts B. The power of courts to review laws C. The power of the president to review the decisions of the courts D. The power of Congress to review the decisions of the courts E. A variety show featuring people in wigs and black robes

The power of courts to review laws

What is appellate jurisdiction? A. The power of some courts to review the decisions of others B. The power of courts to resolve disputes between individuals C. The process by which courts conduct civil trials D. The process by which courts conduct criminal trials E. The power of courts to declare a law unconstitutional

The power of some courts to review the decisions of others

The Purpose Specification Principle

The purpose for data collection should be stated to individuals before their data is collected.

Which principle means that an individual should be told the reason for data collection before the data is collected? A. The collection limitation principle B. The purpose specification principle C. The use limitation principle D. The openness principle E. The accountability principle

The purpose specification principle

Employer monitoring of employees in the workplace is generally allowed. A. True B. False

True

Privacy refers to a person's right to control personal data. A. True B. False

True

Which of the following is not a people-based privacy threat? A. Social engineering B. Web beacons C. Shoulder surfing D. Dumpster diving E. Social networks

Web beacons

It's hard to safeguard against which of the following types of vulnerabilities? A. Information leakage B. Flooding C. Buffer overflow D. Zero-day E. Hardware failure

Zero-day

Web beacon

a small, invisible electronic file that is placed on a Web page or in an e-mail message.

Radio Frequency Identification (RFID)

a technology that uses radio waves to transmit data to a receiver. RFID technology is wireless. f RFID technology is to allow "tagged" items to be identified and tracked.

clickstream

the data trail that an Internet user leaves while browsing.


Ensembles d'études connexes

Call Center Management // EXAM 3 Study Guide

View Set

Server Pro Final Study Set - Part 2

View Set

Masai giraffe. Mammals. Artiodactyla.*(photos)

View Set

Peds Exam 3 GU Practice Questions

View Set

Internship 2- Your Body Language May Shape Who YOU are Quiz

View Set

Chapter 6: Software Development Security

View Set

Where in the World: European Physical Features

View Set

Algebra Chapter 5 Test Review - Linear Functions

View Set

𝙀𝙑𝙀𝙍𝙔𝙈𝘼𝙉: GOOD DEEDS (463-521)

View Set