CHAPTER 2 ASSESSMENT

1. What does a seal program verify?

A. That an organization meets recognized privacy principles

B. That an organization meets recognized legal principles

C. That a third party is trusted

D. That a website does not use cookies

E. None of these is correct.

2. What techniques are used to create a list of the web pages that a computer user visits?

A. Adware, malware, and phishing

B. Malware, cookies, and web beacons

C. Web beacons, clickstreams, and spyware

D. Malware, spyware, and cookies

E. Clickstreams, cookies, and web beacons

3. Which amendment protects against unreasonable searches and seizures?

A. First

B. Third

C. Fourth

D. Fifth

E. Seventh

4. Privacy refers to a person’s right to control personal data.

A. True

B. False ...

Get Legal and Privacy Issues in Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.