GOF Q2 are automatically recorded. This is an example of

advertisement
GOF Q2
1. When a person visits a Web site, his or her IP address and the links he or she clicked on
are automatically recorded. This is an example of
(a) secondary use
(b) invisible information gathering
(c) data spillage
(d) data mining
2. The Privacy Act of 1974 established rules to regulate
(a) private sector databases only
(b) all databases that contain personal information
(c) all personal information, including surveillance data
(d) Federal government databases only
3. A cookie is
(a) a feature of a Web site designed to attract children
(b) an illegal use of information about a customer
(c) a file that a Web site stores on each visitor's computer
(d) a small reward that can be redeemed on a Web site
4. If a business follows an "opt-in" policy for handling personal data, information about a
customer
(a) may not be released under any conditions
(b) may not be released unless the customer gives permission
(c) may be released unless the customer requests that the information be kept private
(d) may be released for any legitimate business purpose
5. A Trap and Trace logs
(a) the phone numbers dialed from a telephone
(b) the phone number from which an incoming call was made
(c) the key used to encrypt an e-mail message
(d) the content of a cell phone conversation
6. The Communications Assistance for Law Enforcement Act (CALEA) said that
(a) a key escrow system must be provided so that communications can be decrypted
(with a court order)
(b) agents of a foreign power may be wiretapped with authorization from a secret court
(c) telecommunications equipment must be designed to allow the interception of
telephone calls (with a court order)
(d) e-mail should have the same degree of legal protection as telephone calls
8. Personal data, including credit histories, for over 160,000 people were stolen from
ChoicePoint. What technique did the thieves use?
(a) Hackers exploited a vulnerability in the server's operating system that gave them
root access
(b) An employee downloaded a screen saver from the Internet that had a Trojan Horse
(c) A fraud ring posing as legitimate businesses set up dozens of accounts with
ChoicePoint and bought the data
(d) All of the above
9. Which of the following are examples of invisible information gathering?
a)
b)
c)
d)
e)
Satellite surveillance
Caller Id
Loyalty cards
Cookies
All of the above
10. Combining and comparing information from more than one database is called
__________.
11. Using data in computer tiles to predict likely behaviors of people is called_____.
12. Which statement best characterizes the relationship of the World Wide Web (WWW)
to the Internet?
a. The WWW is a subset of the Internet.
b. The WWW is a collection of computers on the Internet that allow transmission of
distributed hypermedia documents.
c. The Internet provides a network upon which the WWW protocol and programs can
run.
d. The WWW provides a network upon which TCP/IP is implemented.
13. A policy that requires a potential customer to self-select services
they wish to subscribe to and how that information will be used is
called a ______________.
14. A policy where an existing customer receives electronic
communications without providing express permission is called a
________.
15. Social Security numbers are unique identifiers (true or false)
16. Which is not one of the key aspects of privacy as discussed in A
Gift of Fire
a.
b.
c.
d.
Freedom from intrusion
Freedom to communicate with others
Control of information about oneself
Freedom from surveillance
17. The computer system keeps track of each access to a database, including the particular
person accessing the record. This describes
a. audit trail
b. encryption
c. data locking
d. relational verification
18. What is a pen register used for?
a.
b.
c.
d.
to determine what phone number is called
to identify a person through motions recorded when signing his/her name
it is a database used to identify people through their handwriting
to record a person’s voice
19. The Fourth Amendment to the U.S. Constitution deals with
a.
b.
c.
d.
20.
Freedom of Speech
Discrimination
Self-Incrimination
Search and Seizure
Give a definition according to Sara Basse of privacy.
Download