SlideShare a Scribd company logo
1 of 6
Download to read offline
Question 16 5 pts
The legislation that requires federal government agencies to post privacy policies on their
websites is
Group of answer choices
the e-Goverment act
The Graham-Leach-Bliley Act
The Sarbanes Oxley Act
The HIPPA Act
None of the above
Flag question: Question 17
The problem with using the same userID (such as email address) on multiple websites is that:
Group of answer choices
different userIDs are hard to remember
the userID then becomes a key with which to merge databases
the userID becomes unrestricted
different userIDs weaken overall security
None of the above
Flag question: Question 18
Cookies are passive tracking objects. Invisible graphics than can call out to other web locations
and execute code on an unsuspecting user computer are called
Group of answer choices
cookies
adware
spyware
web bugs
None of the above
Flag question: Question 19
An email sent from one person to another may go through a number of network "hops" and email
servers prior to delivery to the intended destination. At each of these hops and email servers the
email is
Group of answer choices
vulnerable to disclosure
protected by link encryption
enclosed in a VPN tunnel
is always protected by SMIME
None of the above
Flag question: Question 20
The Fair Information Practices is a set of principles that
Group of answer choices
set forth the privacy rights of individuals
impose requirments on data collectors
set forth the privacy rights of only federal employees
set forth the privacy rights of US companies doing business in foreign countries
None of the above
Flag question: Question 21
Private sector data mining is a rapidly growing (and lucrative) business. Linking of databases
established by various sources provide insight into the personal lives and buying habits of
consumers. This strategy allows more effective marketing but can also
Group of answer choices
compromise the privacy of individuals
protect the privacy of individuals
compromise individual access control attributes
incorrectly update source databases
None of the above
Flag question: Question 22
The information privacy laws in the European Union are
Group of answer choices
Much stronger than those in the US
Are weaker than those in the US
Are the same as those in the US
Not yet implemented
None of the above
Flag question: Question 23
One technique an individual might employ to protect his/her identity through pseudonymity is
a(n)
Flag question: Question 24
A technology that uses small, low-power wireless radio transmitters for purposes of
identification is called
Group of answer choices
RFID
UHFID
VHFID
UHFID
Flag question: Question 25
Telephone companies record data, time, duration, source of all calls. ISPs track sites visited and
some keep the IP address of the visiting computer. If a person is unaware of this, such a person
Group of answer choices
can be said to have given informed consent for these data to be collected
cannot be said to have given informed consent for these data to be collected
must stop using these services
can protect their privacy through consent
None of the above
Flag question: Question 26
Which of the basic properties of Computer and Information security (CIA) do we most employ
to protect our privacy?
Group of answer choices
Confidentiality
Integrity
Availability
Authentication
None of the above
Flag question: Question 27
Privacy is
Group of answer choices
The right to control who knows certain things about you
The right to know who has control over your information
The right to disclose information about others
The right to control information about others
None of the above
Flag question: Question 28
Sometimes the owner of a website delivers cookies that belong to another organization. These
cookies are used to track the user across sites and for ad-serving. Such cookies are called
Group of answer choices
third party cookies
ad-serving cookies
googleplex cookies
cross-scripting cookies
None of the above
Flag question: Question 29
Sensitive data, affected parties and controlled disclosure are three aspects of
Group of answer choices
information privacy
information restitution
information privileges
information authorities
None of the above
Flag question: Question 30
Privacy laws in the US vary by state and by municipality; few national laws exit
Group of answer choices
True
False
Question 16 5 pts The legislation that requires federal government age.pdf

More Related Content

Similar to Question 16 5 pts The legislation that requires federal government age.pdf

Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
What are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdfWhat are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdf
amirajsharma
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Walid Maalej
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
Zach Evans
 

Similar to Question 16 5 pts The legislation that requires federal government age.pdf (20)

U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
U.S. Data Privacy Report - Patchy preparation for GDPR shows U.S. businesses ...
 
Chapter2
Chapter2Chapter2
Chapter2
 
Question 16What is a common tactic hackers use to allow themselves.pdf
Question 16What is a common tactic hackers use to allow themselves.pdfQuestion 16What is a common tactic hackers use to allow themselves.pdf
Question 16What is a common tactic hackers use to allow themselves.pdf
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...William Tanenbaum Data Use Rules in Different Business Scenarios:  It's All C...
William Tanenbaum Data Use Rules in Different Business Scenarios: It's All C...
 
Data breaches at home and abroad
Data breaches at home and abroad Data breaches at home and abroad
Data breaches at home and abroad
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
What are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdfWhat are the two types of criminal prohibitions under the Economic E.pdf
What are the two types of criminal prohibitions under the Economic E.pdf
 
Ethics, Law, and E-commerce
Ethics, Law, and E-commerceEthics, Law, and E-commerce
Ethics, Law, and E-commerce
 
GDPR in the Digital World
GDPR in the Digital WorldGDPR in the Digital World
GDPR in the Digital World
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital Age
 
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
Us and Them — A Study of Privacy Requirements Across North America, Asia, and...
 
Online Privacy and Your Company
Online Privacy and Your CompanyOnline Privacy and Your Company
Online Privacy and Your Company
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Newethics
NewethicsNewethics
Newethics
 

More from ChristopherkUzHunter

Python help- You will be writing an encryption program for an IT compa.pdf
Python help- You will be writing an encryption program for an IT compa.pdfPython help- You will be writing an encryption program for an IT compa.pdf
Python help- You will be writing an encryption program for an IT compa.pdf
ChristopherkUzHunter
 

More from ChristopherkUzHunter (20)

Q3-You crossed a female fly with the eyeless mutation for eye shape bu.pdf
Q3-You crossed a female fly with the eyeless mutation for eye shape bu.pdfQ3-You crossed a female fly with the eyeless mutation for eye shape bu.pdf
Q3-You crossed a female fly with the eyeless mutation for eye shape bu.pdf
 
Q3 (10)- A program creates a queue- The program takes array of user na.pdf
Q3 (10)- A program creates a queue- The program takes array of user na.pdfQ3 (10)- A program creates a queue- The program takes array of user na.pdf
Q3 (10)- A program creates a queue- The program takes array of user na.pdf
 
Q2-10- You are studying how a species of snake might respond to climat.pdf
Q2-10- You are studying how a species of snake might respond to climat.pdfQ2-10- You are studying how a species of snake might respond to climat.pdf
Q2-10- You are studying how a species of snake might respond to climat.pdf
 
Q2-8- Which of the following is an example of adaptation- A city-dwell.pdf
Q2-8- Which of the following is an example of adaptation- A city-dwell.pdfQ2-8- Which of the following is an example of adaptation- A city-dwell.pdf
Q2-8- Which of the following is an example of adaptation- A city-dwell.pdf
 
Q2 (10)- A linked-list based stack S has few elements in it as shown b.pdf
Q2 (10)- A linked-list based stack S has few elements in it as shown b.pdfQ2 (10)- A linked-list based stack S has few elements in it as shown b.pdf
Q2 (10)- A linked-list based stack S has few elements in it as shown b.pdf
 
Q1-26- The social bacteria M- xanthus coordinate group attacks on othe.pdf
Q1-26- The social bacteria M- xanthus coordinate group attacks on othe.pdfQ1-26- The social bacteria M- xanthus coordinate group attacks on othe.pdf
Q1-26- The social bacteria M- xanthus coordinate group attacks on othe.pdf
 
Q What are externalities and examples of positive and negative What is.pdf
Q What are externalities and examples of positive and negative What is.pdfQ What are externalities and examples of positive and negative What is.pdf
Q What are externalities and examples of positive and negative What is.pdf
 
python Your program should perform the followings-.pdf
python Your program should perform the followings-.pdfpython Your program should perform the followings-.pdf
python Your program should perform the followings-.pdf
 
Python help- You will be writing an encryption program for an IT compa.pdf
Python help- You will be writing an encryption program for an IT compa.pdfPython help- You will be writing an encryption program for an IT compa.pdf
Python help- You will be writing an encryption program for an IT compa.pdf
 
Q What is the Coase theorem and what does it tell us about externaliti.pdf
Q What is the Coase theorem and what does it tell us about externaliti.pdfQ What is the Coase theorem and what does it tell us about externaliti.pdf
Q What is the Coase theorem and what does it tell us about externaliti.pdf
 
Pythagorean Theorem c2-a2+b2 Triangles demo- - define structure for ke.pdf
Pythagorean Theorem c2-a2+b2 Triangles demo- - define structure for ke.pdfPythagorean Theorem c2-a2+b2 Triangles demo- - define structure for ke.pdf
Pythagorean Theorem c2-a2+b2 Triangles demo- - define structure for ke.pdf
 
Q- the power of the president to veto legislation and the power of the.pdf
Q- the power of the president to veto legislation and the power of the.pdfQ- the power of the president to veto legislation and the power of the.pdf
Q- the power of the president to veto legislation and the power of the.pdf
 
Q1- (12 pts) (a) Is it possible that an event E is independent of E (i.pdf
Q1- (12 pts) (a) Is it possible that an event E is independent of E (i.pdfQ1- (12 pts) (a) Is it possible that an event E is independent of E (i.pdf
Q1- (12 pts) (a) Is it possible that an event E is independent of E (i.pdf
 
Public administration related question 1- A central theme in the post.pdf
Public administration related question  1- A central theme in the post.pdfPublic administration related question  1- A central theme in the post.pdf
Public administration related question 1- A central theme in the post.pdf
 
q- M be the Deterministic Finite Antomata (DFA) show below please answ.pdf
q- M be the Deterministic Finite Antomata (DFA) show below please answ.pdfq- M be the Deterministic Finite Antomata (DFA) show below please answ.pdf
q- M be the Deterministic Finite Antomata (DFA) show below please answ.pdf
 
Q- A resident has been diagnosed with a strote which action would the.pdf
Q- A resident has been diagnosed with a strote which action would the.pdfQ- A resident has been diagnosed with a strote which action would the.pdf
Q- A resident has been diagnosed with a strote which action would the.pdf
 
Python version change I use a MacBook version 12-1 I want to change.pdf
Python version change  I use a MacBook version 12-1  I want to change.pdfPython version change  I use a MacBook version 12-1  I want to change.pdf
Python version change I use a MacBook version 12-1 I want to change.pdf
 
Question 2 a) Write a program code to multiply two square matrices usi.pdf
Question 2 a) Write a program code to multiply two square matrices usi.pdfQuestion 2 a) Write a program code to multiply two square matrices usi.pdf
Question 2 a) Write a program code to multiply two square matrices usi.pdf
 
Question 2 - A two-way set-associative cache has lines of 16 bytes and.pdf
Question 2 - A two-way set-associative cache has lines of 16 bytes and.pdfQuestion 2 - A two-way set-associative cache has lines of 16 bytes and.pdf
Question 2 - A two-way set-associative cache has lines of 16 bytes and.pdf
 
Question 2 (1 point) Match the term with the best corresponding defini.pdf
Question 2 (1 point) Match the term with the best corresponding defini.pdfQuestion 2 (1 point) Match the term with the best corresponding defini.pdf
Question 2 (1 point) Match the term with the best corresponding defini.pdf
 

Recently uploaded

Recently uploaded (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Question 16 5 pts The legislation that requires federal government age.pdf

  • 1. Question 16 5 pts The legislation that requires federal government agencies to post privacy policies on their websites is Group of answer choices the e-Goverment act The Graham-Leach-Bliley Act The Sarbanes Oxley Act The HIPPA Act None of the above Flag question: Question 17 The problem with using the same userID (such as email address) on multiple websites is that: Group of answer choices different userIDs are hard to remember the userID then becomes a key with which to merge databases the userID becomes unrestricted different userIDs weaken overall security None of the above Flag question: Question 18 Cookies are passive tracking objects. Invisible graphics than can call out to other web locations and execute code on an unsuspecting user computer are called Group of answer choices cookies adware spyware
  • 2. web bugs None of the above Flag question: Question 19 An email sent from one person to another may go through a number of network "hops" and email servers prior to delivery to the intended destination. At each of these hops and email servers the email is Group of answer choices vulnerable to disclosure protected by link encryption enclosed in a VPN tunnel is always protected by SMIME None of the above Flag question: Question 20 The Fair Information Practices is a set of principles that Group of answer choices set forth the privacy rights of individuals impose requirments on data collectors set forth the privacy rights of only federal employees set forth the privacy rights of US companies doing business in foreign countries None of the above Flag question: Question 21 Private sector data mining is a rapidly growing (and lucrative) business. Linking of databases established by various sources provide insight into the personal lives and buying habits of consumers. This strategy allows more effective marketing but can also Group of answer choices
  • 3. compromise the privacy of individuals protect the privacy of individuals compromise individual access control attributes incorrectly update source databases None of the above Flag question: Question 22 The information privacy laws in the European Union are Group of answer choices Much stronger than those in the US Are weaker than those in the US Are the same as those in the US Not yet implemented None of the above Flag question: Question 23 One technique an individual might employ to protect his/her identity through pseudonymity is a(n) Flag question: Question 24 A technology that uses small, low-power wireless radio transmitters for purposes of identification is called Group of answer choices RFID UHFID VHFID UHFID
  • 4. Flag question: Question 25 Telephone companies record data, time, duration, source of all calls. ISPs track sites visited and some keep the IP address of the visiting computer. If a person is unaware of this, such a person Group of answer choices can be said to have given informed consent for these data to be collected cannot be said to have given informed consent for these data to be collected must stop using these services can protect their privacy through consent None of the above Flag question: Question 26 Which of the basic properties of Computer and Information security (CIA) do we most employ to protect our privacy? Group of answer choices Confidentiality Integrity Availability Authentication None of the above Flag question: Question 27 Privacy is Group of answer choices The right to control who knows certain things about you The right to know who has control over your information The right to disclose information about others
  • 5. The right to control information about others None of the above Flag question: Question 28 Sometimes the owner of a website delivers cookies that belong to another organization. These cookies are used to track the user across sites and for ad-serving. Such cookies are called Group of answer choices third party cookies ad-serving cookies googleplex cookies cross-scripting cookies None of the above Flag question: Question 29 Sensitive data, affected parties and controlled disclosure are three aspects of Group of answer choices information privacy information restitution information privileges information authorities None of the above Flag question: Question 30 Privacy laws in the US vary by state and by municipality; few national laws exit Group of answer choices True False