WGU Course C841 – Legal Issues in Information Security Task 1 Final

WGU Course C841 – Legal Issues in Information Security Task 1 Final

WGU Course C841 – Legal Issues in Information
Security
The main goal of information security is to protect:
A confidentiality, integrity, and availability
B non-public personally identifiable information
C financial data of public entities
D personal health data and biometrics
A
The _________ established the national banking system in the United
States.
A Bank Holding Company Act of 1956
B Bank Secrecy Act of 1970
C Gramm-Leach-Bliley Act
D National Bank Act of 1864
D
What does ISO stand for?
A International Organization for Security
B Independent Standards Organization
C International Security Organization
D International Organization for Standardization
D

When testing a disaster recovery plan, which test involves hypothetical role-playing
of a disaster?
A full interruption
B parallel
C scenario
D walk-through
C
__ is the practice of tracking a user’s actions on the Internet in order to
create a user profile.
A Clickstreaming
B Targeted advertising
C Radio Frequency Identification (RFID)
D Online profiling
D
What are the four privacy torts that still exist today?
A ECPA, Privacy Act, E-Government Act, and Patriot Act
B intrusion into seclusion, portrayal in a false light, appropriation of likeness or
identity, and public disclosure of private facts
C right to privacy, reasonable person standard, fair information practice principles,
and the Wiretap Act
D in the U.S. Constitution, the First Amendment, Third Amendment, Fourth
Amendment, and Fifth Amendment
B

The ____________ protects the personal information of children
online.
A Children’s Internet Protection Act (CIPA)
B Family Educational Rights and Privacy Act (FERPA)
C Health Insurance Portability and Accountability Act (HIPAA)
D Children’s Online Privacy Protection Act (COPPA)
D
Congress can create laws in areas where the________________ allows it.
A U.S. Constitution
B President
C U.S. Supreme Court
D House of Representatives
A
Compensatory, consequential, nominal, and liquidated are all types of
_.
A performance
B remedies
C damages
D breach
C
The ______
creates international guiding principles for computer
forensic examiners.

A International Organization on Computer Evidence (IOCE)
B American Bar Association Forensic Division
C International Association of Computer Investigative Specialists (IACIS)
D U.S. Federal Bureau of Investigations (FBI)
A
All of the following are eligibility requirements for the president of the United States
except:
A None of these
B must be a resident of the United States for at least 14 years at the time of election
C must be at least 35 years old
A
Massachusetts’ “Standards for the Protection of Personal Information of Residents of
the Commonwealth” was released in September 2008 and is known for being
“unique” in terms of its data protection standard. Which of the following statements
best captures that uniqueness?
A It attempts to regulate businesses outside of Massachusetts by requiring
businesses to encrypt the personal data of Massachusetts residents.
B The standard states that an information security program must include specific
security requirements.
C Under the data protection standard, personal information is a person’s first and
last name, or first initial and last name, and any of the following: Social Security
number, driver’s license number, or state identification card number.
Powered by https://learnexams.com/search/study?query=

Scroll to Top