Unit 6 - Privacy

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not an issue raised regarding how private data is gathered and used? a. By law all encrypted data must contain a "backdoor" entry point. b. The accuracy of the data cannot be verified. c. Informed consent is usually missing or is misunderstood. d. The data is gathered and kept in secret.

a. By law all encrypted data must contain a "backdoor" entry point.

Which of the following is NOT a privacy best practice? a. Carry your Social Security number with you so that it cannot be stolen you are not home. b. Use the private browsing option in your web browser. c. Shred financial documents and paperwork that contains personal information before discarding it. d. Use strong passwords on all accounts that contain personal information.

a. Carry your Social Security number with you so that it cannot be stolen you are not home.

Which of these is NOT a characteristic of a secure hash algorithm? a. Collisions should be rare. b. The hash should always be the same fixed size. c. A message cannot be produced from a predefined hash. d. The results of a hash function should not be reversed.

a. Collisions should be rare.

_____ hides the existence of the data. a. Steganography b. Cryptography c. Asymmetric decryption d. Symmetric encryption

a. Steganography

Which of the following is not a risk associated with the use of private data? a. Individual inconveniences and identity theft. b. Devices being infected with malware. c. Statistical inferences. d. Associations with groups.

b. Devices being infected with malware.

How many keys are used in asymmetric cryptography? a. Three b. Two c. One d. Four

b. Two

A(n) _____ is not decrypted but is only used for comparison purposes. a. key b. digest c. stream d. algorithm

b. digest

A digital signature can provide each of the following benefits EXCEPT ______. a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation

b. verify the receiver

Which of these is not a method for encryption through software? a. Encrypt individual files b. Encrypt using the file system c. Encrypt using a separate hardware computer chip d. Whole disk encryption

c. Encrypt using a separate hardware computer chip

What is ciphertext? a. Procedures based on a mathematical formula used to encrypt and decrypt data. b. The public key of a symmetric cryptographic process. c. Encrypted data. d. A mathematical value entered into an algorithm.

c. Encrypted data.

Proving that a user sent an email message is known as _____. a. availability b. integrity c. nonrepudiation d. repudiation

c. nonrepudiation

Which of the following appears in the web browser when you are connected to a secure website that is using a digital certificate? a. a yellow warning message b. wrench c. padlock d. http://

c. padlock

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Bob's public key c. Bob's private key d. Alice's public key

d. Alice's public key

Each of these is a responsibility of an organization regarding user private data EXCEPT: a. Collect only necessary personal information. b. Do not use personal information when it is not necessary c. Use industry-tested and accepted methods. d. Keep personal information for no longer than 365 days.

d. Keep personal information for no longer than 365 days.

What is the most important advantage of hardware encryption over software encryption? a. Hardware encryption is up to ten times faster than software encryption. b. There are no advantages of hardware encryption over software encryption. c. Software encryption cannot be used on older computers. d. Software that performs encryption can be subject to attacks.

d. Software that performs encryption can be subject to attacks.

Each of the following is true about privacy EXCEPT: a. Privacy is the right to be left alone to the degree that you choose. b. Privacy is freedom from attention, observation, or interference based on your decision. c. Privacy is difficult due to the volume of data silently accumulated by technology. d. Today individuals can achieve any level of privacy that is desired.

d. Today individuals can achieve any level of privacy that is desired.

Which of the following is "one-way" so that its contents cannot be used to reveal the original set of data? a. Message Digest Encryption (MDE) b. symmetric cryptography c. asymmetric cryptography d. hash

d. hash

The areas of a file in which steganography can hide data include all of the following EXCEPT _____. a. in areas that contain the content data itself b. in data that is used to describe the content or structure of the actual data c. in the file header fields that describe the file d. in the directory structure of the file system

d. in the directory structure of the file system

What is data called that is to be encrypted by inputting it into a cryptographic algorithm? a. ciphertext b. opentext c. cleartext d. plaintext

d. plaintext

Which of these is NOT a basic security protection for information that cryptography can provide? a. confidentiality b. integrity c. authenticity d. risk loss

d. risk loss


Ensembles d'études connexes

Chapter 6: sensation and perception

View Set

Section 2.3 Part 2: Translating Phrases to Algebraic Equations and Solving (MORE PROBLEMS)

View Set

Physical States of Elements @ 25 degree Celcius and normal atmosphere pressure

View Set

Test Out PC Pro - 4.3.7 Practice Questions - (Display Devices)

View Set