Copyright

Data Breaches Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Which of these companies had two major data breaches?

Question 2 2. About how many data breaches have happened in the last decade?

Question 3 3. What country supposedly hacked Sony in retaliation to The Interview?

Question 4 4. Which company would be responsible for reporting data breaches?

Question 5 5. Which of these proves that data breaches can happen to anyone, including private individuals?

Page 2

Question 6 6. What was the name of the individual who leaked classified U.S. documents from the NSA?

Question 7 7. In data breach notification laws, 'personally identifiable information' includes:

Question 8 8. Complying with data breach laws can _____ a company

Question 9 9. A company should report a data breach if _____ information has been stolen

Question 10 10. Who had to pay the non-financial cost of rebuilding the trust of allies as a result of Wikileaks?

Page 3

Question 11 11. What is a data breach?

Question 12 12. What is the required response when a firm experiences a data breach?

Question 13 13. Which of these is NOT a typical cost associated with a data breach?

Question 14 14. In many states, companies must report data breaches within _____

Question 15 15. About how many records have been breached in the past decade?

Data Breaches Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Information & Computer Security Training  /  Computer Science Courses
Support