Chapter 6 - Privacy (Q&A)
Which of the following is not an issue raised regarding how private data is gathered and used? A. By law all encrypted data must contain a "backdoor" entry point. B. The data is gathered and kept in secret. C. Informed consent is usually missing or is misunderstood. D. The accuracy of the data cannot be verified.
A. By law all encrypted data must contain a "backdoor" entry point.
Which of these is NOT a method for encryption through software? A. Encrypt using a separate hardware computer chip B. Encrypt using the file system C. Whole disk encryption D. Encrypt individual files
A. Encrypt using a separate hardware computer chip
Each of these is a responsibility of an organization regarding user private data EXCEPT: A. Keep personal information for no longer than 365 days. B. Do not use personal information when it is not necessary C. Collect only necessary personal information. D. Use industry-tested and accepted methods.
A. Keep personal information for no longer than 365 days.
A digital signature can provide each of the following benefits EXCEPT ______. A. verify the receiver B. verify the sender C. prove the integrity of the message D. enforce nonrepudiation
A. verify the receiver
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's public key
Which of the following is NOT a privacy best practice? A. Use strong passwords on all accounts that contain personal information. B. Carry your Social Security number with you so that it cannot be stolen you are not home. C. Shred financial documents and paperwork that contains personal information before discarding it. D. Use the private browsing option in your web browser.
B. Carry your Social Security number with you so that it cannot be stolen you are not home.
Which of the following is not a risk associated with the use of private data? A. Associations with groups. B. Devices being infected with malware. C. Statistical inferences. D. Individual inconveniences and identity theft.
B. Devices being infected with malware.
Which of these is NOT a characteristic of a secure hash algorithm? A. The results of a hash function should not be reversed. B. The hash should always be the same fixed size. C. Collisions should be rare. D. A message cannot be produced from a predefined hash.
C. Collisions should be rare.
What is the most important advantage of hardware encryption over software encryption? A. Software encryption cannot be used on older computers. B. Hardware encryption is up to ten times faster than software encryption. C. There are no advantages of hardware encryption over software encryption. D. Software that performs encryption can be subject to attacks.
D. Software that performs encryption can be subject to attacks.
The areas of a file in which steganography can hide data include all of the following EXCEPT _____. A. in data that is used to describe the content or structure of the actual data B. in the file header fields that describe the file C. in areas that contain the content data itself D. in the directory structure of the file system
D. in the directory structure of the file system
Which of these is NOT a basic security protection for information that cryptography can provide? A. authenticity B. confidentiality C. integrity D. risk loss
D. risk loss
A(n) _____ is not decrypted but is only used for comparison purposes.
Digest
What is ciphertext?
Encrypted data.
Which of the following is "one-way" so that its contents cannot be used to reveal the original set of data?
Hash
Proving that a user sent an email message is known as _____.
Nonrepudiation
Which of the following appears in the web browser when you are connected to a secure website that is using a digital certificate?
Padlock
_____ hides the existence of the data.
Steganography
How many keys are used in asymmetric cryptography?
Two
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
plaintext
Each of the following is true about privacy EXCEPT: A. Today individuals can achieve any level of privacy that is desired. B. Privacy is freedom from attention, observation, or interference based on your decision. C. Privacy is the right to be left alone to the degree that you choose. D. Privacy is difficult due to the volume of data silently accumulated by technology.
A. Today individuals can achieve any level of privacy that is desired.