Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 16 5 pts The legislation that requires federal government agencies to post privacy policies on their websites is Group of answer choices the e-Goverment

Question 16 5 pts

The legislation that requires federal government agencies to post privacy policies on their websites is

Group of answer choices

the e-Goverment act

The Graham-Leach-Bliley Act

The Sarbanes Oxley Act

The HIPPA Act

None of the above

Flag question: Question 17

The problem with using the same userID (such as email address) on multiple websites is that:

Group of answer choices

different userIDs are hard to remember

the userID then becomes a key with which to merge databases

the userID becomes unrestricted

different userIDs weaken overall security

None of the above

Flag question: Question 18

Cookies are passive tracking objects. Invisible graphics than can call out to other web locations and execute code on an unsuspecting user computer are called

Group of answer choices

cookies

adware

spyware

web bugs

None of the above

Flag question: Question 19

An email sent from one person to another may go through a number of network "hops" and email servers prior to delivery to the intended destination. At each of these hops and email servers the email is

Group of answer choices

vulnerable to disclosure

protected by link encryption

enclosed in a VPN tunnel

is always protected by SMIME

None of the above

Flag question: Question 20

The Fair Information Practices is a set of principles that

Group of answer choices

set forth the privacy rights of individuals

impose requirments on data collectors

set forth the privacy rights of only federal employees

set forth the privacy rights of US companies doing business in foreign countries

None of the above

Flag question: Question 21

Private sector data mining is a rapidly growing (and lucrative) business. Linking of databases established by various sources provide insight into the personal lives and buying habits of consumers. This strategy allows more effective marketing but can also

Group of answer choices

compromise the privacy of individuals

protect the privacy of individuals

compromise individual access control attributes

incorrectly update source databases

None of the above

Flag question: Question 22

The information privacy laws in the European Union are

Group of answer choices

Much stronger than those in the US

Are weaker than those in the US

Are the same as those in the US

Not yet implemented

None of the above

Flag question: Question 23

One technique an individual might employ to protect his/her identity through pseudonymity is a(n)

Flag question: Question 24

A technology that uses small, low-power wireless radio transmitters for purposes of identification is called

Group of answer choices

RFID

UHFID

VHFID

UHFID

Flag question: Question 25

Telephone companies record data, time, duration, source of all calls. ISPs track sites visited and some keep the IP address of the visiting computer. If a person is unaware of this, such a person

Group of answer choices

can be said to have given informed consent for these data to be collected

cannot be said to have given informed consent for these data to be collected

must stop using these services

can protect their privacy through consent

None of the above

Flag question: Question 26

Which of the basic properties of Computer and Information security (CIA) do we most employ to protect our privacy?

Group of answer choices

Confidentiality

Integrity

Availability

Authentication

None of the above

Flag question: Question 27

Privacy is

Group of answer choices

The right to control who knows certain things about you

The right to know who has control over your information

The right to disclose information about others

The right to control information about others

None of the above

Flag question: Question 28

Sometimes the owner of a website delivers cookies that belong to another organization. These cookies are used to track the user across sites and for ad-serving. Such cookies are called

Group of answer choices

third party cookies

ad-serving cookies

googleplex cookies

cross-scripting cookies

None of the above

Flag question: Question 29

Sensitive data, affected parties and controlled disclosure are three aspects of

Group of answer choices

information privacy

information restitution

information privileges

information authorities

None of the above

Flag question: Question 30

Privacy laws in the US vary by state and by municipality; few national laws exit

Group of answer choices

True

False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Hands On Database

Authors: Steve Conger

1st Edition

013610827X, 978-0136108276

More Books

Students also viewed these Databases questions

Question

Describe the process of planning scope management

Answered: 1 week ago

Question

=+1. What are the product specifications of media products?

Answered: 1 week ago

Question

Evaluate 3x - x for x = -2 Answer:

Answered: 1 week ago

Question

What is group replacement? Explain with an example. (2-3 lines)

Answered: 1 week ago

Question

=+ c. a company president deciding whether to open a new factory

Answered: 1 week ago