Question
Once you make a post on social media or make a comment in a private chat or email Group of answer choices That comment can
Once you make a post on social media or make a comment in a private chat or email
Group of answer choices
That comment can find its way onto public websites
Your privacy is protected
You still have control of the information
Your post or comment cannot be further shared
None of the above
Flag question: Question 2
A security measure that can be taken to help protect privacy when performing data mining through aggregation is
Group of answer choices
data swapping
data perturbation
data injection
data hiding
None of the above
Flag question: Question 3
Question 3 5 pts
A file formatted as text, sent to your browser by a web site, and stored on your computer, is delivered back to the web site the next time you visit. This file stores the current state of the connection between your computer and the web site. This file is known as
Group of answer choices
a cookie
Adware
Spyware
Web Bug
None of the above
Flag question: Question 4
There is no federal law that specifies the steps companies should take when sensitive customer data have been disclosed through a computer incident
Group of answer choices
True
False
Flag question: Question 5
If an aspect of your personal private information is only disclosed to those who are authorized to view it, does this mean your privacy is protected? why or why not?
Flag question: Question 6
What a person considers private information
Group of answer choices
is a federal standard
is a loosely federated standard amoung state jurisdictions
is a personal decision
is consistent among persons
None of the above
Flag question: Question 7
The major privacy issues with current RFID technology are: (select all that apply)
Group of answer choices
the ability to track RFID-wearing individuals wherever they go
the abilty to discern sensitive data about people
the ability to read RFID tags from great distances
the ability to store very large amounts of data within the RFID tag
None of the above
Flag question: Question 8
Laws requiring notification of loss of personal data as a result of a computer incident are imposed by
Group of answer choices
the individual states in the US
the federal government
the Sarbanes Oxley statute
the Gramm-Leach-Bliley Act
None of the above
Flag question: Question 9
If an unauthorized person is able to establish an account in your name, this is called
Group of answer choices
identity theft
impersonation
identity manipulation
fradulent enrollment
None of the above
Flag question: Question 10
After disclosing something to another party,
Group of answer choices
we lose much control of the information
we can trust the recipient to safeguard our information
we have made the information public
we retain complete control of the information
None of the above
Flag question: Question 11
It is possible to do responsible data mining: extracting valuable data while protecting individual privacy. But this requires
Group of answer choices
companies to employ special measures to protect privacy
limit the size of "mine-able" databases
do so under the supervision of a trusted 3rd party
encrypt all personal information prior to "mining the data"
None of the above
Flag question: Question 12
Question 12 5 pts
Authentication can mean three different things: We can authenticate an individual, an identity or an attribute. Explain the difference
p
Flag question: Question 13
Which of these statements are true? (select any/all that apply)
Group of answer choices
Authenticating an asserted identity is much simpler than determining the identity from the authenticating information
Authenticating an asserted identity is much more difficult than determining the identity from the authenticating information
Authenticating an asserted identity is at the same level of difficulty as determining the identity from the authenticating information
Determining an identity from only the authenticating information for that identity cannot be done
None of the above
Flag question: Question 14
The organization that has jurisdiction over websites that solicit potentially private data is
Group of answer choices
FTC
HIPPA
SEC
FBI
None of the above
Flag question: Question 15
You are considering doing business with company A. You see on the company's website the statement, "we value your privacy". However the company does not have a formal privacy policy. You are not asked to give consent to the sharing of personal information. If you do business with this company
Group of answer choices
Except for specific data protected by statute, you should have no real expectation of privacy
You should expect the company to honor your privacy concerns
You should expect the company to safeguard your information
None of the above
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started