Reference no: EM133523834
Questions
1. The Family Educational Rights and Privacy Act (FERPA) is a federal law that addresses Internet access in public schools and libraries.
A. True
B. False
2. The ______________________ was issued in August 2007 and was initiated to enforce the standardization of security identification credentials for government employees and contractors.
1. Americans with Disabilities Act (ADA)
2. Communications Assistance to Law Enforcement Act (CALEA)
3. Homeland Security Presidential Directive 12 (HSPD 12)
4. Sarbanes-Oxley Act (SOX)
3. For the Health Insurance Portability and Accountability Act (HIPAA), which Unique Identifier Standards Rule identifier was originally developed for the Medicare system?
1. The employer identifier
2. The patient identifier
3. The national provider identifier
4. The health plan identifier
4. ________ is a type of security breach that exploits human nature and human error.
1. System exploit
2. Social engineering
3. Eavesdropping
4. Indirect attack
5. Which group is more likely to consider themselves in the same light as ethical hackers?
1. Closed-source community
2. Crackers
3. Linux users
4. Windows users
6. In the mid-1990s, the Content Scramble System (CSS) was created in partnership with the consumer electronics industry to help defend against piracy. CSS provides encryption to a DVD's sound and graphics files according to predefined algorithms, making it supposedly impossible to replicate a legitimate studio-sanctioned DVD. For which of the following is the CSS most relevant?
1. Computer Fraud and Abuse Act (CFAA)
2. Digital Millennium Copyright Act (DMCA)
3. California Identity Theft Statute
4. World Intellectual Property Organization (WIPO)
7. A privacy impact assessment (PIA) is required in the private sector for any new system that handles personally identifiable information (PII).
A. True
B. False
8. A malicious user could use a reader device to extract information from a Radio Frequency Identification (RFID) badge and use it for unauthorized access.
A. True
B. False
9. Which of the following would be considered vandalism?
1. Accessing a company's direct deposit information
2. Defacing a website
3. Stealing physical equipment
4. Stealing valuable data from a business system
10. ___________________, especially utilizing an independent third party, assesses the robustness of an organization's access controls and access control polices.
1. A tabletop exercise
2. Penetration testing
3. Load testing
4. Software development testing
11. Data in motion (DIM) is the term used to describe data in transit.
A. True
B. False