Long Test CMSC 315

Long Test CMSC 315

University

40 Qs

quiz-placeholder

Similar activities

Database

Database

KG - University

35 Qs

Digital information | Computer Science Principles

Digital information | Computer Science Principles

10th Grade - University

36 Qs

CYBER SECURITY CLASS TEST 5

CYBER SECURITY CLASS TEST 5

University

39 Qs

unit 2 revision whole unit

unit 2 revision whole unit

11th Grade - University

45 Qs

Term 2 test

Term 2 test

6th Grade - University

40 Qs

CSC 308 ISA MIDTERM EXAM

CSC 308 ISA MIDTERM EXAM

University

45 Qs

Security Part 2( Technical Diploma)

Security Part 2( Technical Diploma)

University

35 Qs

Relationship in Database

Relationship in Database

University

40 Qs

Long Test CMSC 315

Long Test CMSC 315

Assessment

Quiz

Computers

University

Easy

Created by

Sarah Escote

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of privacy protection laws?

To promote data sharing among businesses

To restrict internet access globally

To prevent misuse of personal data and ensure user consent

To allow governments to monitor citizens

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which law gives EU citizens control over their personal data?

HIPAA

PIPEDA

GDPR

CCPA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The CCPA allows consumers to:

Block advertisements on all platforms

Know what data is collected and request its deletion

Sue any company for collecting data

Automatically encrypt their internet usage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

HIPAA primarily protects:

Social media activity

Financial transactions

Medical information

Online shopping preferences

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which UK law governs data protection and privacy?

GDPR

CCPA

Data Protection Act

HIPAA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major threat to online anonymity is:

The lack of free Wi-Fi

The increase in ad-blocker usage

High internet bills

The extensive digital footprint left on social media

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a data breach?

A network upgrade

Unauthorized access to sensitive information

A software update

A slow internet connection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?