Chapter 9 – ‘Confidentiality and Privacy Controls’ Flashcards

1
Q
  1. Which of the following statements is true? 
    a. Encryption is sufficient to protect confidentiality and privacy.
    b. Cookies are text files that only store information. They cannot perform any
    actions.
    c. The controls for protecting confidentiality are not effective for protecting
    privacy.
    d. All of the above are true.
A

b. Cookies are text files that only store information. They cannot perform any
actions. (Correct. Cookies are text files, not executable programs. They can,
however, store sensitive information, so they should be protected.) 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A digital signature is ____________.  
    a. created by hashing a document and then encrypting the hash with the
    signer’s private key
    b. created by hashing a document and then encrypting the hash with the
    signer’s public key
    c. created by hashing a document and then encrypting the hash with the
    signer’s symmetric key
    d. none of the above
A

a. created by hashing a document and then encrypting the hash with the
signer’s private key (Correct. Creating a hash provides a way to verify the
integrity of a document, and encrypting it with the signer’s private key
provides a way to prove that the sender created the document.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Able wants to send a file to Baker over the Internet and protect the file
    so that only Baker can read it and can verify that it came from Able.
    What should Able do? 
    a. Encrypt the file using Able’s public key, and then encrypt it again using
    Baker’s private key.
    b. Encrypt the file using Able’s private key, and then encrypt it again using
    Baker’s private key.
    c. Encrypt the file using Able’s public key, and then encrypt it again using
    Baker’s public key.
    d. Encrypt the file using Able’s private key, and then encrypt it again using
    Baker’s public key.
A

d. Encrypt the file using Able’s private key, and then encrypt it again using
Baker’s public key. (Correct. Encrypting it with Baker’s public key means that
only Baker can decrypt it. Then, Baker can use Able’s public key to decrypt the
file—if the result is under- standable, it had to have been created by Able and
encrypted with Able’s private key.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following statements is true? 
    a. Encryption and hashing are both reversible (can be decoded).
    b. Encryption is reversible, but hashing is not.
    c. Hashing is reversible, but encryption is not.  
    d. Neither hashing nor encryption is reversible.
A

b. Encryption is reversible, but hashing is not. (Correct. Encryption can be
reversed to decrypt the ciphertext, but hashing cannot be reversed.) 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following statements about obtaining consent to collect
    and use a customer’s personal information is true? 
    a. The default policy in Europe is opt-out, but in the United States the default
    is option.
    b. The default policy in Europe is opt-in, but in the United States the default is
    opt-out.
    c. The default policy in both Europe and the United States is opt-in.
    d. The default policy in both Europe and the United States is opt-out.
A

b. The default policy in Europe is opt-in, but in the United States the default is
opt-out. (Correct.) 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. One of the ten Generally Accepted Privacy Principles concerns security.
    According to GAPP, what is the nature of the relationship between
    security and privacy?
    a. Privacy is a necessary, but not sufficient, precondition to effective security.
    b. Privacy is both necessary and sufficient to effective security.
    c. Security is a necessary, but not sufficient, precondition to protect privacy.
A

c. Security is a necessary, but not sufficient, precondition to protect privacy.
(Correct.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following statements is true? 
    a. Symmetric encryption is faster than asymmetric encryption and can be used
    to provide nonrepudiation of contracts.
    b. Symmetric encryption is faster than asymmetric encryption but cannot be
    used to provide nonrepudiation of contracts.
    c. Asymmetric encryption is faster than symmetric encryption and can be used
    to provide nonrepudiation of contracts.
    d. a symmetric encryption is faster than symmetric encryption but cannot be
    used to provide nonrepudiation of contracts.
A

b. Symmetric encryption is faster than asymmetric encryption but cannot be
used to provide nonrepudiation of contracts. (Correct. Symmetric encryption is
faster than asymmetric encryption, but it cannot be used for nonrepudiation;
the key is shared by both parties, so there is no way to prove who created and
encrypted a document.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following statements is true? 
    a. VPNs protect the confidentiality of information while it is in transit over the
    Internet.  
    b. Encryption limits firewalls’ ability to filter traffic.
    c. A digital certificate contains that entity’s public key.
    d. All of the above are true.
A

d. All of the above are true. (Correct. All three statements are true.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following can organizations use to protect the privacy of
    a customer’s personal information when giving programmers a realistic
    data set with which to test a new application?  
    a. Digital signature.  
    b. Digital watermark.  
    c. Data loss prevention.
    d. Data masking.
A

d. Data masking. (Correct. Masking replaces actual values with fake ones, but
the result is still the same type of data, which can then be used to test program
logic.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Confidentiality focuses on protecting ____________.

c. merger and acquisition plans

A

► c. merger and acquisition plans (Correct. Merger and acquisition plans are sensitive
information that should not be made public until the deal is consummated.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly