Each of the following is true about privacy EXCEPT:
Privacy is the right to be left alone to the degree that you choose.
Today individuals can achieve any level of privacy that is desired.
Privacy is difficult due to the volume of data silently accumulated by technology.
Privacy is freedom from attention, observation, or interference based on your decision.
answer
Today individuals can achieve any level of privacy that is desired.
question
Which of the following is not a risk associated with the use of private data?
individual inconveniences and identity theft
devices being infected with malware
associations with groups
statistical inferences
answer
devices being infected with malware
question
Which of the following is not an issue raised regarding how private data is gathered and used?
The data is gathered and kept in secret.
The accuracy of the data cannot be verified.
By law, all encrypted data must contain a "backdoor" entry point.
Informed consent is usually missing or is misunderstood.
answer
By law, all encrypted data must contain a "backdoor" entry point.
question
_____ hides the existence of the data.
Cryptography
Symmetric encryption
Asymmetric decryption
Steganography
answer
Steganography
question
What is ciphertext?
Procedures based on a mathematical formula used to encrypt and decrypt data.
A mathematical value entered into an algorithm.
Encrypted data.
The public key of a symmetric cryptographic process.
answer
Encrypted data.
question
Which of the following is "one-way" so that its contents cannot be used to reveal the original set of data?
hash
symmetric cryptography
Message Digest Encryption (MDE)
asymmetric cryptography
answer
hash
question
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
ciphertext
plaintext
cleartext
opentext
answer
plaintext
question
Which of these is NOT a basic security protection for information that cryptography can provide?
risk loss
authenticity
integrity
confidentiality
answer
risk loss
question
The areas of a file in which steganography can hide data include all of the following EXCEPT _____.
data that is used to describe the content or structure of the actual data
the directory structure of the file system
the file header fields that describe the file
areas that contain the content data itself
answer
the directory structure of the file system
question
Proving that a user sent an email message is known as _____.
repudiation
integrity
nonrepudiation
availability
answer
nonrepudiation
question
A(n) _____ is not decrypted but is only used for comparison purposes.
stream
digest
algorithm
key
answer
digest
question
Which of these is NOT a characteristic of a secure hash algorithm?
A message cannot be produced from a predefined hash.
Collisions should be rare.
The results of a hash function should not be reversed.
The hash should always be the same fixed size.
answer
Collisions should be rare.
question
How many keys are used in asymmetric cryptography?
one
two
three
four
answer
two
question
Which of these is not a method for encryption through software?
encrypt individual files
whole disk encryption
encrypt using the file system
encrypt using a separate hardware computer chip
answer
encrypt using a separate hardware computer chip
question
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Alice's private key
Alice's public key
Bob's public key
Bob's private key
answer
Alice's public key
question
A digital signature can provide each of the following benefits
EXCEPT _____.
proving the integrity of the message
verifying the receiver
verifying the sender
enforcing nonrepudiation
answer
verifying the receiver
question
What is the most important advantage of hardware encryption over software encryption?
Software encryption cannot be used on older computers.
Hardware encryption is up to 10 times faster than software encryption.
Software that performs encryption can be subject to attacks.
There are no advantages of hardware encryption over software encryption.
answer
Software that performs encryption can be subject to attacks.
question
Which of the following appears in the web browser when you are connected to a secure website that is using a digital certificate?
http://
wrench
padlock
a yellow warning message
answer
padlock
question
Which of the following is NOT a privacy best practice?
Use the private browsing option in your web browser.
Shred financial documents and paperwork that contains personal information before discarding it.
Use strong passwords on all accounts that contain personal information.
Carry your Social Security number with you so that it cannot be stolen you are not home.
answer
Carry your Social Security number with you so that it cannot be stolen you are not home.
question
Each of these is a responsibility of an organization regarding user private data EXCEPT:
Collect only necessary personal information.
Use industry-tested and accepted methods.
Keep personal information for no longer than 365 days.
Do not use personal information when it is not necessary.
answer
Keep personal information for no longer than 365 days.
Haven't found what you need?
Search for quizzes and test answers now
Quizzes.studymoose.com uses cookies. By continuing you agree to our cookie policy