Informational Privacy and Cybersecurity MCQs

Informational Privacy and Cybersecurity MCQs

Answer these 40 Informational Privacy and Cybersecurity MCQs and assess your grip on the subject of Informational Privacy and Cybersecurity.
Scroll below and get started!

1: The ability of employees and customers to use an information technology system without disruption is known as ?

A.   Availability

B.   Handiness

C.   Approachability

D.   None of these

2: The extension of constitutional protections to oral, written, and electronic communications is known as ?

A.   Communications privacy

B.   Approachability

C.   Attainability

D.   None of these

3: The ability to keep valuable data private that are stored in an information technology system; this may be achieved by tools such as access controls and _____ software?

A.   Encrypting

B.   Enciphering

C.   Encipherment

D.   Encrypt

4: Contextual integrity is a person’s sense of privacy is disturbed when there are________ flows of personal information?

A.   Unsuitable

B.   Unfitting

C.   Inappropriate

D.   Inopportune

5: The Data privacy protection of someone’s general data; also known as informational privacy?

A.   True

B.   False

6: A means of securing or protecting data exchanges between two parties is known as ?

A.   Encrypting

B.   Enciphering

C.   Encipherment

D.   Encrypt

7: The protection of someone’s personal data; also known as data privacy Informational privacy is the protection of someone’s personal data; also known as____?

A.   Informational privacy

B.   Data privacy

C.   Personal information

D.   None of these

8: The protection of information systems from being improperly altered or compromised is known as ?

A.   Integrity

B.   Morality

C.   Righteousness

D.   None of these

9: The protection of oral, written, and electronic communications is what type of privacy right?

A.   Communications

B.   Information

C.   Data

D.   Contemporary

10: George asked for a copy of his medical records from his physician's office. The office emailed his records and included his employer. This action is considered a violation of ______.

A.   Information type

B.   Contextual integrity

C.   Transmission principle

D.   Contemporary principle

11: Someone sharing personal information without that person's knowledge is an example of ______ contextual integrity.

A.   Enforcing

B.   Questioning

C.   Violating

D.   Emphasizing

12: What theory captures the critical importance of establishing a zone of privacy that restricts others from access to our personal affairs and data flows?

A.   Controlling access

B.   Restrict control/open access

C.   Enforcing control/violating access

D.   Restricted access/limited control

A.   Informational

B.   Instrumental

C.   Contemporary

D.   Individual

14: An example of a naturally private situation is described as ______.

A.   Shopping at the grocery store

B.   Reading at the library

C.   Relaxing on a secluded island

D.   Swimming in the ocean

15: An example of a naturally private situation is described as ______.

A.   Shopping at the grocery store

B.   Reading at the library

C.   Relaxing on a secluded island

D.   Swimming in the ocean

16: Civic associations and corporations need security or protection from intrusion and unwarranted interference. What level of security is this?

A.   Group

B.   Personal

C.   National

D.   Business

17: Information technology systems must keep valuable data private. This is an example of ______.

A.   Contemporary

B.   Confidentiality

C.   Integrity

D.   Availability

18: Firewalls, antivirus software, and other tools hinder the efforts of hackers to infect a system with malware. This is an example of ______.

A.   Contemporary

B.   Confidentiality

C.   Integrity

D.   Availability

19: Every nation and its institutions need protection from foreign invasion or attacks carried out as part of a terrorist campaign. What level of security is this?

A.   Personal

B.   Group

C.   National

D.   Business

20: Specialized firewalls equipped with router-based filtering can usually prevent cyberattacks and sustain system ______.

A.   Contemporary

B.   Confidentiality

C.   Integrity

D.   Availability

21: Specialized firewalls equipped with router-based filtering can usually prevent cyberattacks and sustain system ______.

A.   Contemporary

B.   Confidentiality

C.   Integrity

D.   Availability

22: What was Yahoo's reasoning for not informing customers about the hacking incident?

A.   They were unaware of customer information being hacked.

B.   Exposing the flaws in the code would attract malicious attackers.

C.   They were focusing on a solution to the hack.

D.   They didn't feel the customers needed to be informed.

23: Which company hired freelance bug hunters and paid them

A.   Verizon

B.   Yahoo

C.   Google

D.   Apple

24: The internet community took the hiring of ______ as a positive sign of Yahoo prioritizing security measures.

A.   Carol Bartz

B.   Marissa Mayer

C.   Edward Snowden

D.   Alex Stamos

25: Ponemon Institute said the average time it takes organizations to identify an attack is ______ days, and to contain a breach is ______ days after discovery.

A.   191/56

B.   191/58

C.   189/56

D.   181/58

26: How much time did it take for Yahoo to realize the full scope of the 2014 beach?

A.   One year

B.   191 days

C.   Two years

D.   58 days

27: What could Yahoo do to protect their customers against so many security breaches?

A.   Provide stronger security measures including encrypting user information

B.   Improve the ease of use of the search engine and create new mobile apps

C.   Create a cleaner look for Yahoo Mail and develop new products

D.   Hire additional IT technicians for customer support

28: Securing or protecting data exchanges between two parties is called ______.

A.   Antivirus

B.   Firewall

C.   Encryption

D.   Transmission

29: Which company was the first to enhance security by using encryption software that prevented anyone other than the owner of the phone from accessing its data?

A.   Verizon

B.   Yahoo

C.   Google

D.   Apple

30: Why did the FBI and government fight so hard to gain access to encrypted information in iPhones?

A.   To have access to Apple users' information for personal use

B.   For access to terrorist phones for valuable information

C.   To collect information for a data survey

D.   To provide protective software from hackers

31: Why do you think Apple did not want to provide the FBI with a master key that would bypass encryption codes?

A.   To prevent the exposure of illegal information

B.   To protect the personal privacy of their customers

C.   To prevent a waste of time and resources

D.   To protect the company from a lawsuit

32: Why do you think Apple did not want to provide the FBI with a master key that would bypass encryption codes?

A.   To prevent the exposure of illegal information

B.   To protect the personal privacy of their customers

C.   To prevent a waste of time and resources

D.   To protect the company from a lawsuit

33: China accessed the email of Gmail users by breaching Google's back door, which had been created as a ______ in response to U.S. search warrants.

A.   Personal security system

B.   Unlawful access system

C.   Private security system

D.   Lawful access system

34: The FBI requested that Apple incorporate a(n) ______ into new iPhones.

A.   Back door

B.   Front door

C.   Firewall

D.   Antivirus

35: ___________ is the duty of every government that wants to ensure its national security.

A.   Remote Access

B.   Exposure factor

C.   Recovery time objective (RTO)

D.   Cybersecurity

36: Many people object to increased cybersecurity because _____.

A.   There is insufficient memory and bandwidth to implement it

B.   It will cost too much money to implement

C.   It will slow down Internet transaction speeds

D.   It may violate personal freedoms and privacy

37: In general, it's not a good idea to implement significant policy changes during a _______________.

A.   Reduction in force

B.   Primary data

C.   Observational data

D.   Marketing outcome data

38: A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

A.   Honeypots

B.   False attack stimulus

C.   Signatures

D.   None of these

39: Cybercards are most useful for __________.

A.   Keeping a personal diary

B.   Writing to-do lists

C.   Tracking Internet-based research

D.   Creating new inventions

40: The __________ act of 1996 attempts to prevent trade secrets from being illegally shared.

A.   Public

B.   Fraud

C.   Liability

D.   Economic Espionage