Answer these 40 Informational Privacy and Cybersecurity MCQs and assess your grip on the subject of Informational Privacy and Cybersecurity.
Scroll below and get started!
A. Availability
B. Handiness
C. Approachability
D. None of these
A. Communications privacy
B. Approachability
C. Attainability
D. None of these
A. Encrypting
B. Enciphering
C. Encipherment
D. Encrypt
A. Unsuitable
B. Unfitting
C. Inappropriate
D. Inopportune
A. True
B. False
A. Encrypting
B. Enciphering
C. Encipherment
D. Encrypt
A. Informational privacy
B. Data privacy
C. Personal information
D. None of these
A. Integrity
B. Morality
C. Righteousness
D. None of these
A. Communications
B. Information
C. Data
D. Contemporary
A. Information type
B. Contextual integrity
C. Transmission principle
D. Contemporary principle
A. Enforcing
B. Questioning
C. Violating
D. Emphasizing
A. Controlling access
B. Restrict control/open access
C. Enforcing control/violating access
D. Restricted access/limited control
A. Informational
B. Instrumental
C. Contemporary
D. Individual
A. Shopping at the grocery store
B. Reading at the library
C. Relaxing on a secluded island
D. Swimming in the ocean
A. Shopping at the grocery store
B. Reading at the library
C. Relaxing on a secluded island
D. Swimming in the ocean
A. Group
B. Personal
C. National
D. Business
A. Contemporary
B. Confidentiality
C. Integrity
D. Availability
A. Contemporary
B. Confidentiality
C. Integrity
D. Availability
A. Personal
B. Group
C. National
D. Business
A. Contemporary
B. Confidentiality
C. Integrity
D. Availability
A. Contemporary
B. Confidentiality
C. Integrity
D. Availability
A. They were unaware of customer information being hacked.
B. Exposing the flaws in the code would attract malicious attackers.
C. They were focusing on a solution to the hack.
D. They didn't feel the customers needed to be informed.
A. Verizon
B. Yahoo
C. Google
D. Apple
A. Carol Bartz
B. Marissa Mayer
C. Edward Snowden
D. Alex Stamos
A. 191/56
B. 191/58
C. 189/56
D. 181/58
A. One year
B. 191 days
C. Two years
D. 58 days
A. Provide stronger security measures including encrypting user information
B. Improve the ease of use of the search engine and create new mobile apps
C. Create a cleaner look for Yahoo Mail and develop new products
D. Hire additional IT technicians for customer support
A. Antivirus
B. Firewall
C. Encryption
D. Transmission
A. Verizon
B. Yahoo
C. Google
D. Apple
A. To have access to Apple users' information for personal use
B. For access to terrorist phones for valuable information
C. To collect information for a data survey
D. To provide protective software from hackers
A. To prevent the exposure of illegal information
B. To protect the personal privacy of their customers
C. To prevent a waste of time and resources
D. To protect the company from a lawsuit
A. To prevent the exposure of illegal information
B. To protect the personal privacy of their customers
C. To prevent a waste of time and resources
D. To protect the company from a lawsuit
A. Personal security system
B. Unlawful access system
C. Private security system
D. Lawful access system
A. Back door
B. Front door
C. Firewall
D. Antivirus
A. Remote Access
B. Exposure factor
C. Recovery time objective (RTO)
D. Cybersecurity
A. There is insufficient memory and bandwidth to implement it
B. It will cost too much money to implement
C. It will slow down Internet transaction speeds
D. It may violate personal freedoms and privacy
A. Reduction in force
B. Primary data
C. Observational data
D. Marketing outcome data
A. Honeypots
B. False attack stimulus
C. Signatures
D. None of these
A. Keeping a personal diary
B. Writing to-do lists
C. Tracking Internet-based research
D. Creating new inventions
A. Public
B. Fraud
C. Liability
D. Economic Espionage