Question
Question 16 5 pts The legislation that requires federal government agencies to post privacy policies on their websites is Group of answer choices the e-Goverment
Question 16 5 pts
The legislation that requires federal government agencies to post privacy policies on their websites is
Group of answer choices
the e-Goverment act
The Graham-Leach-Bliley Act
The Sarbanes Oxley Act
The HIPPA Act
None of the above
Flag question: Question 17
The problem with using the same userID (such as email address) on multiple websites is that:
Group of answer choices
different userIDs are hard to remember
the userID then becomes a key with which to merge databases
the userID becomes unrestricted
different userIDs weaken overall security
None of the above
Flag question: Question 18
Cookies are passive tracking objects. Invisible graphics than can call out to other web locations and execute code on an unsuspecting user computer are called
Group of answer choices
cookies
adware
spyware
web bugs
None of the above
Flag question: Question 19
An email sent from one person to another may go through a number of network "hops" and email servers prior to delivery to the intended destination. At each of these hops and email servers the email is
Group of answer choices
vulnerable to disclosure
protected by link encryption
enclosed in a VPN tunnel
is always protected by SMIME
None of the above
Flag question: Question 20
The Fair Information Practices is a set of principles that
Group of answer choices
set forth the privacy rights of individuals
impose requirments on data collectors
set forth the privacy rights of only federal employees
set forth the privacy rights of US companies doing business in foreign countries
None of the above
Flag question: Question 21
Private sector data mining is a rapidly growing (and lucrative) business. Linking of databases established by various sources provide insight into the personal lives and buying habits of consumers. This strategy allows more effective marketing but can also
Group of answer choices
compromise the privacy of individuals
protect the privacy of individuals
compromise individual access control attributes
incorrectly update source databases
None of the above
Flag question: Question 22
The information privacy laws in the European Union are
Group of answer choices
Much stronger than those in the US
Are weaker than those in the US
Are the same as those in the US
Not yet implemented
None of the above
Flag question: Question 23
One technique an individual might employ to protect his/her identity through pseudonymity is a(n)
Flag question: Question 24
A technology that uses small, low-power wireless radio transmitters for purposes of identification is called
Group of answer choices
RFID
UHFID
VHFID
UHFID
Flag question: Question 25
Telephone companies record data, time, duration, source of all calls. ISPs track sites visited and some keep the IP address of the visiting computer. If a person is unaware of this, such a person
Group of answer choices
can be said to have given informed consent for these data to be collected
cannot be said to have given informed consent for these data to be collected
must stop using these services
can protect their privacy through consent
None of the above
Flag question: Question 26
Which of the basic properties of Computer and Information security (CIA) do we most employ to protect our privacy?
Group of answer choices
Confidentiality
Integrity
Availability
Authentication
None of the above
Flag question: Question 27
Privacy is
Group of answer choices
The right to control who knows certain things about you
The right to know who has control over your information
The right to disclose information about others
The right to control information about others
None of the above
Flag question: Question 28
Sometimes the owner of a website delivers cookies that belong to another organization. These cookies are used to track the user across sites and for ad-serving. Such cookies are called
Group of answer choices
third party cookies
ad-serving cookies
googleplex cookies
cross-scripting cookies
None of the above
Flag question: Question 29
Sensitive data, affected parties and controlled disclosure are three aspects of
Group of answer choices
information privacy
information restitution
information privileges
information authorities
None of the above
Flag question: Question 30
Privacy laws in the US vary by state and by municipality; few national laws exit
Group of answer choices
True
False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started