EXAM WITH 95 QUESTION AND
CORRECT DETAILED ANSWERS WITH
RATIONALES.
A reasonable expectation of privacy is the same as the reasonable person standard. -
ANSWERS--False
All of the following are true with respect to cryptography except: - ANSWERS--only used
today by health care providers to protect health care data
How might the average person use cookies in a beneficial way? - ANSWERS--You save
an image of a relaxing, cloud-filled sky that appears every time you log-on to your
Twitter account.
In which of the following types of communication is phishing least likely to occur? -
ANSWERS--phone calls
Integrity means that information systems and their data are accurate. - ANSWERS--
True
____________ is the practice of tracking a user's actions on the Internet in order to
create a user profile. - ANSWERS--Online profiling
, A keystroke logger is harmful code intentionally left on a computer system. It lies
dormant for a certain period, and when specific conditions are met, it "explodes" and
carries out its malicious function. - ANSWERS--False
Which statement about privacy is NOT true? - ANSWERS--Privacy means that a person
can specify the collection, use, and sharing of their data.
_____________ is an individual's right to control the use and disclosure of his or her
own personal data. - ANSWERS--Privacy
______________ means that only people with the right permission can access and use
information. - ANSWERS--Confidentiality
_______________ is the process of reviewing known vulnerabilities and threats. -
ANSWERS--Risk Analysis
________________ involves tricking other people into breaking security procedures
and sharing sensitive information. - ANSWERS--Social Engineering
__________________ is a body of law developed because of legal tradition and court
cases. - ANSWERS--Common Law
___________________ refers to applying safeguards designed to lower risks to a level
deemed acceptable but without eliminating such risks. - ANSWERS--Risk Mitigation
Which type of safeguard is put in place in order to limit the damage caused by a security
incident? - ANSWERS--Corrective
Which of the following correctly summarizes an employer's right to monitor telephone
conversations? - ANSWERS--An employer has right to monitor telephone conversations
in the ordinary course of business without a court order.
Which of the following U.S. Constitution amendments contribute to the right of privacy? -
ANSWERS--First, Third, and Fourth Amendments
Which of following is not one of the categories of vulnerabilities? - ANSWERS--Domain
What situation would be an example of an exploit? - ANSWERS--An art thief sneaks
into a museum and steals a famous painting and then sneaks out of the museum
without being caught by security because the thief identified and traveled through the
museum via blind spots of the museum's security cameras. After the incident, the
museum increases the number of security guards and cameras guarding the museum
at all times.