CORRECT ANSWERS
Which of the following is a legitimate responsibility of an organization regarding user
private data? - Answer- Limit administrative access to personal information.
Which of the following is a place where steganography can hide data? - Answer- in the
metadata of a file
Which of the following is a risk associated with the use of private data? - Answer-
Associations with groups.
Which of the following is an advantage of hardware encryption over software
encryption? - Answer- Hardware encryption is not subject to attacks like software
encryption.
Which of the following is NOT a privacy best practice? - Answer- Always carry your
Social Security number with you
Which of the following is NOT a protection for information that cryptography can
provide? - Answer- redundancy
Which of the following is NOT an element of asymmetric cryptography? - Answer- Hash
Algorithm
Which of the following is NOT true about privacy? - Answer- Privacy of any level that
you desire is easily achievable today.
Which of the following is NOT true regarding how individuals are concerned how their
private data is being used? - Answer- Their personal information is no more at risk
today than it was 10 years ago.
Which of these is a characteristic of a secure hash algorithm? - Answer- Two different
sets of data cannot produce the same digest
Which technology hides the existence of data? - Answer- Steganography
Which type of cryptography creates a value that is primarily used for comparison
purposes? - Answer- hashing
, Cryptography hides the existence of data while steganography scrambles a message so
that it cannot be understood. - Answer- False
If the URL of a web site begins with https, the server is using a digital certificate to verify
the existence and identity of the organization. - Answer- True
Online data is collected for a number of activities, but not for online purchases. -
Answer- False
From January 2005 through July 2015, approximately how many electronic data records
in the United States were breached, exposing to attackers a range of personal
electronic data, such as address, Social Security numbers, health records, and credit
card numbers? - Answer- 853 million
How do attackers today make it difficult to distinguish an attack from legitimate traffic? -
Answer- using common Internet protocols
Information contained on devices is protected by three layers: Two of the layers are
products and policies and procedures. What is the third layer? - Answer- people
Security is ____ convenience. - Answer- inversely proportional to
Terrorists who turn their attacks to the network and computer infrastructure to cause
panic among citizens are known as which of the following? - Answer- cyberterrorists
Under which law must healthcare enterprises guard protected health information and
implement policies and procedures to safeguard it, whether it be in paper or electronic
format? - Answer- HIPAA
What does the FBI define as any "premeditated, politically motivated attack against
information, computer systems, computer programs, and data which results in violence
against non-combatant targets by sub-national groups or clandestine agents?" -
Answer- cyberterrorism
What is a flaw or weakness that allows a threat agent to bypass security? - Answer-
vulnerability
What term is frequently used to describe the tasks of securing information that is in a
digital format? - Answer- information security
Where are you most likely to find a PKES system? - Answer- An automobile
Which attacker category might have the objective of retaliation against an employer? -
Answer- insider