MCQs > Business & Organization > Business Ethics MCQs > Informational Privacy and Cybersecurity MCQs

Informational Privacy and Cybersecurity MCQ

The __________ act of 1996 attempts to prevent trade secrets from being illegally shared.

Answer

Correct Answer: Economic Espionage

Note: This Question is unanswered, help us to find answer for this one

Cybercards are most useful for __________.

Answer

Correct Answer: Tracking Internet-based research

Note: This Question is unanswered, help us to find answer for this one

A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

Answer

Correct Answer: False attack stimulus

Note: This Question is unanswered, help us to find answer for this one

In general, it's not a good idea to implement significant policy changes during a _______________.

Answer

Correct Answer: Reduction in force

Note: This Question is unanswered, help us to find answer for this one

Many people object to increased cybersecurity because _____.

Answer

Correct Answer: It may violate personal freedoms and privacy

Note: This Question is unanswered, help us to find answer for this one

___________ is the duty of every government that wants to ensure its national security.

Answer

Correct Answer: Cybersecurity

Note: This Question is unanswered, help us to find answer for this one

The FBI requested that Apple incorporate a(n) ______ into new iPhones.

Answer

Correct Answer: Back door

Note: This Question is unanswered, help us to find answer for this one

China accessed the email of Gmail users by breaching Google's back door, which had been created as a ______ in response to U.S. search warrants.

Answer

Correct Answer: Lawful access system

Note: This Question is unanswered, help us to find answer for this one

Why do you think Apple did not want to provide the FBI with a master key that would bypass encryption codes?

Answer

Correct Answer: To prevent the exposure of illegal information

Note: This Question is unanswered, help us to find answer for this one

Why do you think Apple did not want to provide the FBI with a master key that would bypass encryption codes?

Answer

Correct Answer: To protect the personal privacy of their customers

Note: This Question is unanswered, help us to find answer for this one

Why did the FBI and government fight so hard to gain access to encrypted information in iPhones?

Answer

Correct Answer: For access to terrorist phones for valuable information

Note: This Question is unanswered, help us to find answer for this one

Which company was the first to enhance security by using encryption software that prevented anyone other than the owner of the phone from accessing its data?

Answer

Correct Answer: Apple

Note: This Question is unanswered, help us to find answer for this one

Securing or protecting data exchanges between two parties is called ______.

Answer

Correct Answer: Encryption

Note: This Question is unanswered, help us to find answer for this one

What could Yahoo do to protect their customers against so many security breaches?

Answer

Correct Answer: Provide stronger security measures including encrypting user information

Note: This Question is unanswered, help us to find answer for this one

How much time did it take for Yahoo to realize the full scope of the 2014 beach?

Answer

Correct Answer: Two years

Note: This Question is unanswered, help us to find answer for this one

Ponemon Institute said the average time it takes organizations to identify an attack is ______ days, and to contain a breach is ______ days after discovery.

Answer

Correct Answer: 191/58

Note: This Question is unanswered, help us to find answer for this one

The internet community took the hiring of ______ as a positive sign of Yahoo prioritizing security measures.

Answer

Correct Answer: Alex Stamos

Note: This Question is unanswered, help us to find answer for this one

Which company hired freelance bug hunters and paid them

Answer

Correct Answer: Google

Note: This Question is unanswered, help us to find answer for this one

What was Yahoo's reasoning for not informing customers about the hacking incident?

Answer

Correct Answer: Exposing the flaws in the code would attract malicious attackers.

Note: This Question is unanswered, help us to find answer for this one

Specialized firewalls equipped with router-based filtering can usually prevent cyberattacks and sustain system ______.

Answer

Correct Answer: Availability

Note: This Question is unanswered, help us to find answer for this one

Specialized firewalls equipped with router-based filtering can usually prevent cyberattacks and sustain system ______.

Answer

Correct Answer: Availability

Note: This Question is unanswered, help us to find answer for this one

Every nation and its institutions need protection from foreign invasion or attacks carried out as part of a terrorist campaign. What level of security is this?

Answer

Correct Answer: National

Note: This Question is unanswered, help us to find answer for this one

Firewalls, antivirus software, and other tools hinder the efforts of hackers to infect a system with malware. This is an example of ______.

Answer

Correct Answer: Integrity

Note: This Question is unanswered, help us to find answer for this one

Information technology systems must keep valuable data private. This is an example of ______.

Answer

Correct Answer: Confidentiality

Note: This Question is unanswered, help us to find answer for this one

Civic associations and corporations need security or protection from intrusion and unwarranted interference. What level of security is this?

Answer

Correct Answer: Group

Note: This Question is unanswered, help us to find answer for this one

An example of a naturally private situation is described as ______.

Answer

Correct Answer: Reading at the library

Note: This Question is unanswered, help us to find answer for this one

An example of a naturally private situation is described as ______.

Answer

Correct Answer: Relaxing on a secluded island

Note: This Question is unanswered, help us to find answer for this one

A condition of restricted accessibility, where access to one's personal information is limited based on the situation or context along with the prevailing moral and legal norms, is called ______ privacy.

Answer

Correct Answer: Informational

Note: This Question is unanswered, help us to find answer for this one

What theory captures the critical importance of establishing a zone of privacy that restricts others from access to our personal affairs and data flows?

Answer

Correct Answer: Restricted access/limited control

Note: This Question is unanswered, help us to find answer for this one

Someone sharing personal information without that person's knowledge is an example of ______ contextual integrity.

Answer

Correct Answer: Violating

Note: This Question is unanswered, help us to find answer for this one

George asked for a copy of his medical records from his physician's office. The office emailed his records and included his employer. This action is considered a violation of ______.

Answer

Correct Answer: Contextual integrity

Note: This Question is unanswered, help us to find answer for this one

The protection of oral, written, and electronic communications is what type of privacy right?

Answer

Correct Answer: Communications

Note: This Question is unanswered, help us to find answer for this one

The protection of information systems from being improperly altered or compromised is known as ?

Answer

Correct Answer: Integrity

Note: This Question is unanswered, help us to find answer for this one

The protection of someone’s personal data; also known as data privacy Informational privacy is the protection of someone’s personal data; also known as____?

Answer

Correct Answer: Data privacy

Note: This Question is unanswered, help us to find answer for this one

A means of securing or protecting data exchanges between two parties is known as ?

Answer

Correct Answer: Encrypting

Note: This Question is unanswered, help us to find answer for this one

The Data privacy protection of someone’s general data; also known as informational privacy?

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

Contextual integrity is a person’s sense of privacy is disturbed when there are________ flows of personal information?

Answer

Correct Answer: Inappropriate

Note: This Question is unanswered, help us to find answer for this one

The ability to keep valuable data private that are stored in an information technology system; this may be achieved by tools such as access controls and _____ software?

Answer

Correct Answer: Encrypting

Note: This Question is unanswered, help us to find answer for this one

The extension of constitutional protections to oral, written, and electronic communications is known as ?

Answer

Correct Answer: Communications privacy

Note: This Question is unanswered, help us to find answer for this one

The ability of employees and customers to use an information technology system without disruption is known as ?

Answer

Correct Answer: Availability

Note: This Question is unanswered, help us to find answer for this one