AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

quiz-placeholder

Similar activities

Chapter 6: E-commerce & Social Informatics Quiz

Chapter 6: E-commerce & Social Informatics Quiz

University

20 Qs

Cybersecurity Fundamentals Theory Test 2

Cybersecurity Fundamentals Theory Test 2

University

19 Qs

Unit-1 Introduction to Cloud Computing

Unit-1 Introduction to Cloud Computing

University

20 Qs

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

UTS - SIB

UTS - SIB

University

17 Qs

Living in the IT Era: Knowledge Assessment

Living in the IT Era: Knowledge Assessment

University

16 Qs

DRILL IT ERA

DRILL IT ERA

2nd Grade - University

16 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Farhah Shafiy

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the basic actions that an organization must take to preserve the confidentiality of sensitive information?

Identification of information to be protected.

Backing up the information.

Controlling access to the information.

Training.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After the information that needs to be protected has been identified, what step should be completed next?

The information needs to be placed in a secure, central area.

The information needs to be encrypted.

The information needs to be classified in terms of its value to the organization.

The information needs to be depreciated.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software blocks outgoing messages containing key words or phrases associated with an organization's sensitive data?

Anti-virus software.

Data loss prevention software.

A digital watermark.

Information rights software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software provides an additional layer of protection to sensitive information that is stored in digital format, offering the capability not only to limit access to specific files or documents but also to specify the actions that individuals who are granted access to that resource can perform?

Anti-virus software.

Data loss prevention software.

A digital watermark.

Information rights software.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using

An information rights management software.

A data loss prevention software.

A digital watermark.

A stop leak software.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

Provide free credit report monitoring for customers.

Inform customers of the option to opt-out of data collection and use of their personal information.

Allow customers' browsers to decline to accept cookies.

Utilize controls to prevent unauthorized access to, and disclosure of, customers' information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client approached Paxton Uffe and said, "Paxton, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Paxton responded, "The most effective solution is to implement

A data masking program.

A virtual private network.

A private cloud environment.

An encryption system with digital signatures.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?