SEC280 Quiz Week 2

$4.00

SEC280 Quiz Week 2
(TCO 8) Which law mandates that information that is no longer needed must be properly disposed of, either by burning…

SKU: SEC 280 Quiz Week 2 Categories: , Tags: , , ,

Description

SEC280 Quiz Week 2

SEC280 Quiz Week 2

A+

(TCO 2) Pretty good privacy (or PGP) is _____.

A privacy group that fights against the government

A common encryption method for e-mail

A password-management system

A method of securing an operating-system kernel

(TCO 2) All of the following are techniques used by a social engineer except _____.

When an attacker replaces a blank deposit slip in a bank lobby with one containing his account number

When an attacker calls up the IT department posing as an employee and requests a password

When an attacker runs a brute-force attack on a password

When an attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information

(TCO 2) When creating a password, users tend to use _____.

All capital letters

Passwords that are too long

Names of family members, pets, or teams

Numbers only

 (TCO 2) What is PKCS?

One of the standards used in implementing a public-key infrastructure

A method of private cryptography used by the military

A method of encrypting e-mail from the IRS

The method of encryption that used a 40 bit encryption key

 (TCO 8) Which law mandates that information that is no longer needed must be properly disposed of, either by burning, pulverizing, or shredding?

FCRA

PCI DSS

FACTA

GBLA

(TCO 8) The Wassenaar Arrangement can be described as which of the following?

An international arrangement on export controls for conventional arms as well as dual-use goods and technologies

An international arrangement on import controls

A rule governing the import of encryption in the United States

A rule governing the export of encryption in the United States

 (TCO 8) What do you call a law that is based on previous events or precedents?

Statutory law

Administrative law

Common law

Blue law

(TCO 8) Which of the following is a standard that provides guidance and the level of expected protection on the elements of a credit-card transaction that needs protection?

FCRA

PCI DSS

FACTA

GBLA

(TCO 8) The Electronic Communications Privacy Act (ECPA) of 1986 _____.

Implements the principle that a signature, contract, or other record may not be deleted

Denies legal effect, validity, or enforceability solely because it is in electronic form

Addresses a myriad of legal privacy issues that resulted from the increasing use of computers and other technology specific to telecommunications

Makes it a violation of federal law to knowingly use another’s identity

Is a major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals

(TCO 8) A video rental store shares its customer database with a private investigator. The rental store may have violated which law?

COPPA

VPPA

FERPA

CFAA