DPbD - Session 2

DPbD - Session 2

University

10 Qs

Similar activities

Quantum Computing

Quantum Computing

8th Grade - University

10 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

IT Participation 6

IT Participation 6

University

15 Qs

Professional Issues Midterm Quiz

Professional Issues Midterm Quiz

University

15 Qs

Living in the IT Era - Q1

Living in the IT Era - Q1

University

15 Qs

Lecture 4

Lecture 4

University

10 Qs

CSSY1208 Lesson 6 - Laws and Regulations

CSSY1208 Lesson 6 - Laws and Regulations

University

10 Qs

DPbD - Session 2

DPbD - Session 2

Assessment

Quiz

Created by

M Salman Nadeem

Computers

University

16 plays

Medium

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What purpose does threat modeling serve in data privacy?

It predicts the cost of a data breach.

  1. It identifies potential threats and vulnerabilities in a system.

It models data flow within an organization.

  1. It helps in choosing the marketing strategies.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which project lists the top privacy risks in web applications?

LINDDUN

OWASP Top 10

GDPR List

  1. PETs Enumeration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is 'data masking' primarily used for?

Enhancing the data

Sharing data with third parties

Protecting confidential data

Deleting unnecessary data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. In the context of data privacy, what is 'K-anonymity'?

A method to use data without revealing the user identity

A type of encryption

A regulation regarding data sharing

A form of data masking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the primary goal of Privacy Enhancing Technologies (PETs)?

  1. To enhance the speed of data processing

To protect the privacy of users' data

To increase data storage capabilities

To improve data sharing options

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the following cryptography type is considered as keyless?

Permutation

Anonymization

Hash

Aggregation

7.

DRAG AND DROP QUESTION

30 sec • 1 pt

Using Public key cryptography, the sender needs to use recipient's ​ (a)   key to send an encrypted message. The recipient will use own ​ (b)   key to decrypt the message.

Public
Private
Secret
Personal

8.

DRAG AND DROP QUESTION

30 sec • 1 pt

Using Public key cryptography, the sender needs to use own ​ (a)   key to send a digitally signed message. The recipient will use sender's ​ (b)   key to verify the digital signature.

Public
Private
Secret
Personal

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be regarded as Quasi-identifier in a dataset containing Full Name, Credit Card number and Age.

Full Name

Credit Card number

Age

None

10.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a dataset regarded as K-anonymous, a higher value of 'k' should determine what exactly?

More accurate, less private values

More private, less accurate values

More private, more accurate values

Less private, Less accurate values

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?