Question 16 5 pts The legislation that requires federal government agencies to post privacy policies on their websites is Group of answer choices the e-Goverment act The Graham-Leach-Bliley Act The Sarbanes Oxley Act The HIPPA Act None of the above Flag question: Question 17 The problem with using the same userID (such as email address) on multiple websites is that: Group of answer choices different userIDs are hard to remember the userID then becomes a key with which to merge databases the userID becomes unrestricted different userIDs weaken overall security None of the above Flag question: Question 18 Cookies are passive tracking objects. Invisible graphics than can call out to other web locations and execute code on an unsuspecting user computer are called Group of answer choices cookies adware spyware web bugs None of the above Flag question: Question 19 An email sent from one person to another may go through a number of network "hops" and email servers prior to delivery to the intended destination. At each of these hops and email servers the email is Group of answer choices vulnerable to disclosure protected by link encryption enclosed in a VPN tunnel is always protected by SMIME None of the above Flag question: Question 20 The Fair Information Practices is a set of principles that Group of answer choices set forth the privacy rights of individuals impose requirments on data collectors set forth the privacy rights of only federal employees set forth the privacy rights of US companies doing business in foreign countries None of the above Flag question: Question 21 Private sector data mining is a rapidly growing (and lucrative) business. Linking of databases established by various sources provide insight into the personal lives and buying habits of consumers. This strategy allows more effective marketing but can also Group of answer choices compromise the privacy of individuals protect the privacy of individuals compromise individual access control attributes incorrectly update source databases None of the above Flag question: Question 22 The information privacy laws in the European Union are Group of answer choices Much stronger than those in the US Are weaker than those in the US Are the same as those in the US Not yet implemented None of the above Flag question: Question 23 One technique an individual might employ to protect his/her identity through pseudonymity is a(n) Flag question: Question 24 A technology that uses small, low-power wireless radio transmitters for purposes of identification is called Group of answer choices RFID UHFID VHFID UHFID Flag question: Question 25 Telephone companies record data, time, duration, source of all calls. ISPs track sites visited and some keep the IP address of the visiting computer. If a person is unaware of this, such a person Group of answer choices can be said to have given informed consent for these data to be collected cannot be said to have given informed consent for these data to be collec.