chapter#4
Data and Privacy
b. Data security
c. Data integrity
d. Data availability
Answer: b. Data security
2. What is personally identifiable information (PII)?
a. Random data
b. Information that can be used to identify an individual
c. Encrypted data
d. Non-sensitive data
Answer: b. Information that can be used to identify an individual
3. Which of the following is an example of sensitive data?
a. Public blog posts
b. Weather updates
c. Home address
d. General news
Answer: c. Home address
4. What is the purpose of a privacy policy on a website?
a. To prevent access to the website
b. To inform users about how their data is collected and used
c. To display advertisements
d. To promote products
Answer: b. To inform users about how their data is collected and used
5. Which type of cyber attack involves tricking individuals into revealing sensitive information?
a. Malware attack
b. Phishing attack
c. DDoS attack
d. Ransomware attack
Answer: b. Phishing attack
6. What does GDPR stand for in the context of data privacy?
a. Global Data Processing Regulations
b. General Data Protection Regulation
c. Government Data Privacy Rules
d. General Digital Privacy Requirement
Answer: b. General Data Protection Regulation
7. In the context of data privacy, what does the term "encryption" mean?
a. Hiding data within a file
b. Converting data into a readable format
c. Converting data into a non-readable format
d. Deleting data permanently
Answer: c. Converting data into a non-readable format
8. What is the purpose of a firewall in the context of data security?
a. To filter internet content
b. To prevent physical theft
c. To monitor email communication
d. To block unauthorized access to a network
Answer: d. To block unauthorized access to a network
9. Which of the following is an example of two-factor authentication?
a. Username and password
b. Fingerprint scan and password
c. Email address and PIN
d. Security question and answer
Answer: b. Fingerprint scan and password
10. What is the significance of a "cookie" in web browsing?
a. A small piece of data stored on the user's device by a website
b. A type of malware
c. A hardware component
d. A computer virus
Answer: a. A small piece of data stored on the user's device by a website
11. Which organization is responsible for enforcing data protection laws in the European Union? a. FTC (Federal Trade Commission)
b. CIA (Central Intelligence Agency)
c. EU Parliament
d. ICO (Information Commissioner's Office)
Answer: d. ICO (Information Commissioner's Office) Commissioner's Office)**
12. What does the acronym VPN stand for in the context of online privacy?
a. Virtual Private Network
b. Very Private Network
c. Volatile Personal Network
d. Valid Public Network
Answer: a. Virtual Private Network
13. What is the purpose of a CAPTCHA on a website?
a. To prevent automated bots from accessing the website
b. To encrypt user data
c. To track user behavior
d. To display advertisements
Answer: a. To prevent automated bots from accessing the website
14. Which of the following is an example of a strong password?
a. Password123
b. 123456
c. Xy#2Pq9!z
d. ABCDabcd
Answer: c. Xy#2Pq9!z
15. What is the purpose of biometric authentication?
a. Recognizing physical characteristics for user identification
b. Sending secure emails
c. Blocking malicious websites
d. Encrypting data
Answer: a. Recognizing physical characteristics for user identification
16. What is the role of a data breach notification?
a. To hide information about a data breach
b. To inform affected individuals about a data breach
c. To delete all data after a breach
d. To recover lost data
Answer: b. To inform affected individuals about a data breach
17. What does the term "data minimization" mean in the context of data privacy?
a. Maximizing the amount of collected data
b. Reducing the amount of collected and stored data to the minimum necessary
c. Deleting all collected data
d. Encrypting all collected data
Answer: b. Reducing the amount of collected and stored data to the minimum necessary
18. Which of the following is an example of a social engineering attack?
a. Virus infection
b. DDoS attack
c. Phishing attack
d. Firewall breach
Answer: c. Phishing attack
19. What is the purpose of regular software updates in terms of security?
a. To slow down the computer
b. To add new features
c. To fix security vulnerabilities
d. To increase system requirements
Answer: c. To fix security vulnerabilities
20. In the context of online accounts, what is the purpose of a recovery email or phone number?
a. To receive promotional messages
b. To reset the account password in case of a forgotten password
c. To share personal information with the service provider
d. To block unauthorized access
Answer: b. To reset the account password in case of a forgotten password
**Answer: reset the account password

No comments:
Post a Comment