Ch 6 - Information Security & Data Breach Notification Flashcards
Which of the following is not one of the key attributes of the information security triad?
a. Applicability
b. Confidentiality
c. Integrity
d. None of the above
a. Applicability
Which of the following is not one of the key attributes of the information security triad?
a. Availability
b. Confidentiality
c. Intelligent
d. None of the above
c. Intelligent
Which of the following is not one of the types of security controls for preventing, detecting, or correcting a security incident?
a. Physical controls
b. Administrative controls
c. Technical controls
d. None of the above
d. None of the above
Which of the following involves the data subject’s right to control their data, including rights to notice and choice?
a. Information security
b. Information privacy
c. Privacy controls
d. All of the above
b. Information privacy
Which law preempts the CA AB 1950 due to greater information security requirements?
a. Gramm-Leach Bliley Act
b. Right to Financial Privacy
c. The Privacy Act of 1974
d. None of the above
a. Gramm-Leach Bliley Act
Which of the following laws preempts the CA AB 1950 information security requirements?
a. Right to Financial Privacy
b. Health Insurance Portability and Accountability Act
c. The Privacy Act of 1974
d. None of the above
b. Health Insurance Portability and Accountability Act
Which of the following are sources that, when combined with an individual’s name, constitute personal information under California’s Assembly Bill 1950?
a. SSN, Driver’s License or ID Card number, financial account number
b. Health card ID number, gym membership number, employee ID number
c. Medical information, health insurance information, data collected from an automated license plate recognition system
d. Only a and c
d. Only a and c
Which of the following states enacted the most prescriptive information security law in 2010 following the law enacted by CA in 2003?
a. New York
b. Washington
c. Massachusetts
d. Delaware
c. Massachusetts
Which of the following states enacted information security laws after CA enacted AG 1950?
a. New York
b. Massachusetts
c. Washington
d. All of the above
d. All of the above
Which of the following states enacted the strictest information security law in 2017 following the law enacted by CA in 2003?
a. Washington
b. New York
c. Massachusetts
d. Delaware
b. New York
Which of the following is not one of the eight types of incidents listed by the Privacy Rights Clearinghouse?
a. Unintended disclosure
b. Hacking or malware
c. Phishing
d. Payment card fraud
c. Phishing
Which of the following states enacted an information security law that mirrors some of the requirements of the Payment Card Industry Data Security Standard (PCI DSS)?
a. Minnesota
b. Nevada
c. Washington
d. All of the above
d. All of the above
Which of the following is not one of the eight types of incidents listed by the Privacy Rights Clearinghouse?
a. Identity theft
b. Insider
c. Physical loss
d. Portable device
a. Identity theft
Which of the following is not one of the eight types of incidents listed by the Privacy Rights Clearinghouse?
a. Unintended disclosure
b. Stationary device
c. Elder abuse
d. Unknown or other
c. Elder abuse
Which of the following is potential evidence that a data breach by attackers may have occurred?
a. Multiple failed log-in attempts
b. Sudden use of long-dormant access accounts
c. Use of information systems during off-hours
d. All of the above
d. All of the above