Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Once you make a post on social media or make a comment in a private chat or email Group of answer choices That comment can

Once you make a post on social media or make a comment in a private chat or email

Group of answer choices

That comment can find its way onto public websites

Your privacy is protected

You still have control of the information

Your post or comment cannot be further shared

None of the above

Flag question: Question 2

A security measure that can be taken to help protect privacy when performing data mining through aggregation is

Group of answer choices

data swapping

data perturbation

data injection

data hiding

None of the above

Flag question: Question 3

Question 3 5 pts

A file formatted as text, sent to your browser by a web site, and stored on your computer, is delivered back to the web site the next time you visit. This file stores the current state of the connection between your computer and the web site. This file is known as

Group of answer choices

a cookie

Adware

Spyware

Web Bug

None of the above

Flag question: Question 4

There is no federal law that specifies the steps companies should take when sensitive customer data have been disclosed through a computer incident

Group of answer choices

True

False

Flag question: Question 5

If an aspect of your personal private information is only disclosed to those who are authorized to view it, does this mean your privacy is protected? why or why not?

Flag question: Question 6

What a person considers private information

Group of answer choices

is a federal standard

is a loosely federated standard amoung state jurisdictions

is a personal decision

is consistent among persons

None of the above

Flag question: Question 7

The major privacy issues with current RFID technology are: (select all that apply)

Group of answer choices

the ability to track RFID-wearing individuals wherever they go

the abilty to discern sensitive data about people

the ability to read RFID tags from great distances

the ability to store very large amounts of data within the RFID tag

None of the above

Flag question: Question 8

Laws requiring notification of loss of personal data as a result of a computer incident are imposed by

Group of answer choices

the individual states in the US

the federal government

the Sarbanes Oxley statute

the Gramm-Leach-Bliley Act

None of the above

Flag question: Question 9

If an unauthorized person is able to establish an account in your name, this is called

Group of answer choices

identity theft

impersonation

identity manipulation

fradulent enrollment

None of the above

Flag question: Question 10

After disclosing something to another party,

Group of answer choices

we lose much control of the information

we can trust the recipient to safeguard our information

we have made the information public

we retain complete control of the information

None of the above

Flag question: Question 11

It is possible to do responsible data mining: extracting valuable data while protecting individual privacy. But this requires

Group of answer choices

companies to employ special measures to protect privacy

limit the size of "mine-able" databases

do so under the supervision of a trusted 3rd party

encrypt all personal information prior to "mining the data"

None of the above

Flag question: Question 12

Question 12 5 pts

Authentication can mean three different things: We can authenticate an individual, an identity or an attribute. Explain the difference

p

Flag question: Question 13

Which of these statements are true? (select any/all that apply)

Group of answer choices

Authenticating an asserted identity is much simpler than determining the identity from the authenticating information

Authenticating an asserted identity is much more difficult than determining the identity from the authenticating information

Authenticating an asserted identity is at the same level of difficulty as determining the identity from the authenticating information

Determining an identity from only the authenticating information for that identity cannot be done

None of the above

Flag question: Question 14

The organization that has jurisdiction over websites that solicit potentially private data is

Group of answer choices

FTC

HIPPA

SEC

FBI

None of the above

Flag question: Question 15

You are considering doing business with company A. You see on the company's website the statement, "we value your privacy". However the company does not have a formal privacy policy. You are not asked to give consent to the sharing of personal information. If you do business with this company

Group of answer choices

Except for specific data protected by statute, you should have no real expectation of privacy

You should expect the company to honor your privacy concerns

You should expect the company to safeguard your information

None of the above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2017 Skopje Macedonia September 18 22 2017 Proceedings Part 3 Lnai 10536

Authors: Yasemin Altun ,Kamalika Das ,Taneli Mielikainen ,Donato Malerba ,Jerzy Stefanowski ,Jesse Read ,Marinka Zitnik ,Michelangelo Ceci ,Saso Dzeroski

1st Edition

3319712721, 978-3319712727

More Books

Students also viewed these Databases questions

Question

The nonlinear system x1(x1 + 1) + 2x2 = 18, (x1 1)2 + (x2 6)2 = 25

Answered: 1 week ago

Question

8. Explain the relationship between communication and context.

Answered: 1 week ago