1. The __________ act of 1996 attempts to prevent trade secrets from being illegally shared.
Answer
Correct Answer:
Economic Espionage
Note: This Question is unanswered, help us to find answer for this one
2. Cybercards are most useful for __________.
Answer
Correct Answer:
Tracking Internet-based research
Note: This Question is unanswered, help us to find answer for this one
3. A(n) __________ is an event that triggers an alarm when no actual attack is in progress.
Answer
Correct Answer:
False attack stimulus
Note: This Question is unanswered, help us to find answer for this one
4. In general, it's not a good idea to implement significant policy changes during a _______________.
Answer
Correct Answer:
Reduction in force
Note: This Question is unanswered, help us to find answer for this one
5. Many people object to increased cybersecurity because _____.
Answer
Correct Answer:
It may violate personal freedoms and privacy
Note: This Question is unanswered, help us to find answer for this one
6. ___________ is the duty of every government that wants to ensure its national security.
Answer
Correct Answer:
Cybersecurity
Note: This Question is unanswered, help us to find answer for this one
7. The FBI requested that Apple incorporate a(n) ______ into new iPhones.
Answer
Correct Answer:
Back door
Note: This Question is unanswered, help us to find answer for this one
8. China accessed the email of Gmail users by breaching Google's back door, which had been created as a ______ in response to U.S. search warrants.
Answer
Correct Answer:
Lawful access system
Note: This Question is unanswered, help us to find answer for this one
9. Why do you think Apple did not want to provide the FBI with a master key that would bypass encryption codes?
Answer
Correct Answer:
To prevent the exposure of illegal information
Note: This Question is unanswered, help us to find answer for this one
10. Why do you think Apple did not want to provide the FBI with a master key that would bypass encryption codes?
Answer
Correct Answer:
To protect the personal privacy of their customers
Note: This Question is unanswered, help us to find answer for this one
11. Why did the FBI and government fight so hard to gain access to encrypted information in iPhones?
Answer
Correct Answer:
For access to terrorist phones for valuable information
Note: This Question is unanswered, help us to find answer for this one
12. Which company was the first to enhance security by using encryption software that prevented anyone other than the owner of the phone from accessing its data?
Answer
Correct Answer:
Apple
Note: This Question is unanswered, help us to find answer for this one
13. Securing or protecting data exchanges between two parties is called ______.
Answer
Correct Answer:
Encryption
Note: This Question is unanswered, help us to find answer for this one
14. What could Yahoo do to protect their customers against so many security breaches?
Answer
Correct Answer:
Provide stronger security measures including encrypting user information
Note: This Question is unanswered, help us to find answer for this one
15. How much time did it take for Yahoo to realize the full scope of the 2014 beach?
Answer
Correct Answer:
Two years
Note: This Question is unanswered, help us to find answer for this one
16. Ponemon Institute said the average time it takes organizations to identify an attack is ______ days, and to contain a breach is ______ days after discovery.
Answer
Correct Answer:
191/58
Note: This Question is unanswered, help us to find answer for this one
17. The internet community took the hiring of ______ as a positive sign of Yahoo prioritizing security measures.
Answer
Correct Answer:
Alex Stamos
Note: This Question is unanswered, help us to find answer for this one
18. Which company hired freelance bug hunters and paid them
Answer
Correct Answer:
Google
Note: This Question is unanswered, help us to find answer for this one
19. What was Yahoo's reasoning for not informing customers about the hacking incident?
Answer
Correct Answer:
Exposing the flaws in the code would attract malicious attackers.
Note: This Question is unanswered, help us to find answer for this one
20. Specialized firewalls equipped with router-based filtering can usually prevent cyberattacks and sustain system ______.
Answer
Correct Answer:
Availability
Note: This Question is unanswered, help us to find answer for this one
21. Specialized firewalls equipped with router-based filtering can usually prevent cyberattacks and sustain system ______.
Answer
Correct Answer:
Availability
Note: This Question is unanswered, help us to find answer for this one
22. Every nation and its institutions need protection from foreign invasion or attacks carried out as part of a terrorist campaign. What level of security is this?
Answer
Correct Answer:
National
Note: This Question is unanswered, help us to find answer for this one
23. Firewalls, antivirus software, and other tools hinder the efforts of hackers to infect a system with malware. This is an example of ______.
Answer
Correct Answer:
Integrity
Note: This Question is unanswered, help us to find answer for this one
24. Information technology systems must keep valuable data private. This is an example of ______.
Answer
Correct Answer:
Confidentiality
Note: This Question is unanswered, help us to find answer for this one
25. Civic associations and corporations need security or protection from intrusion and unwarranted interference. What level of security is this?
Answer
Correct Answer:
Group
Note: This Question is unanswered, help us to find answer for this one
26. An example of a naturally private situation is described as ______.
Answer
Correct Answer:
Reading at the library
Note: This Question is unanswered, help us to find answer for this one
27. An example of a naturally private situation is described as ______.
Answer
Correct Answer:
Relaxing on a secluded island
Note: This Question is unanswered, help us to find answer for this one
28. A condition of restricted accessibility, where access to one's personal information is limited based on the situation or context along with the prevailing moral and legal norms, is called ______ privacy.
Answer
Correct Answer:
Informational
Note: This Question is unanswered, help us to find answer for this one
29. What theory captures the critical importance of establishing a zone of privacy that restricts others from access to our personal affairs and data flows?
Answer
Correct Answer:
Restricted access/limited control
Note: This Question is unanswered, help us to find answer for this one
30. Someone sharing personal information without that person's knowledge is an example of ______ contextual integrity.
Answer
Correct Answer:
Violating
Note: This Question is unanswered, help us to find answer for this one
31. George asked for a copy of his medical records from his physician's office. The office emailed his records and included his employer. This action is considered a violation of ______.
Answer
Correct Answer:
Contextual integrity
Note: This Question is unanswered, help us to find answer for this one
32. The protection of oral, written, and electronic communications is what type of privacy right?
Answer
Correct Answer:
Communications
Note: This Question is unanswered, help us to find answer for this one
33. The protection of information systems from being improperly altered or compromised is known as ?
Answer
Correct Answer:
Integrity
Note: This Question is unanswered, help us to find answer for this one
34. The protection of someone’s personal data; also known as data privacy Informational privacy is the protection of someone’s personal data; also known as____?
Answer
Correct Answer:
Data privacy
Note: This Question is unanswered, help us to find answer for this one
35. A means of securing or protecting data exchanges between two parties is known as ?
Answer
Correct Answer:
Encrypting
Note: This Question is unanswered, help us to find answer for this one
36. The Data privacy protection of someone’s general data; also known as informational privacy?
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
37. Contextual integrity is a person’s sense of privacy is disturbed when there are________ flows of personal information?
Answer
Correct Answer:
Inappropriate
Note: This Question is unanswered, help us to find answer for this one
38. The ability to keep valuable data private that are stored in an information technology system; this may be achieved by tools such as access controls and _____ software?
Answer
Correct Answer:
Encrypting
Note: This Question is unanswered, help us to find answer for this one
39. The extension of constitutional protections to oral, written, and electronic communications is known as ?
Answer
Correct Answer:
Communications privacy
Note: This Question is unanswered, help us to find answer for this one
40. The ability of employees and customers to use an information technology system without disruption is known as ?
Answer
Correct Answer:
Availability
Note: This Question is unanswered, help us to find answer for this one