Copyright

Online Privacy & Security Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Businesses are trying to handle consumer privacy issues by supporting all of the following, EXCEPT:

Question 2 2. The federal agency that oversees consumer protection of privacy and deceptive or unfair business practices is the _____.

Question 3 3. Manny the Manager wants to be transparent in letting customers know how his company collects, uses, and shares information. To do this, he drafts a document that reflects his company's _____.

Question 4 4. _____ is a small data file stored on a computer hard drive by a website when the user visits the site.

Question 5 5. Which of the following is NOT an example of a cyber crime?

Page 2

Question 6 6. What corporate officer manages security and privacy technology factors?

Question 7 7. Susan would like to buy a car but must take out a loan to close the deal. Which Act will protect her right to privacy in this area?

Question 8 8. A privacy policy may be used by a company so that employees _____.

Question 9 9. Which of the following is an example of phishing?

Question 10 10. What is identity theft?

Page 3

Question 11 11. A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.

Question 12 12. Honeypots are used by security professionals to _____.

Question 13 13. Which of the following is NOT a program used by employers to monitor employees' computer usage?

Question 14 14. How does a computer virus work?

Question 15 15. Which of the following statements about cyberstalking is TRUE?

Page 4

Question 16 16. How does the COPPA protect the privacy of children?

Question 17 17. Which of the following BEST describes the monitoring of people with technology, often without their knowledge?

Question 18 18. Which of the following refers to the right to determine when, and to what extent, information about oneself can be communicated to others?

Question 19 19. The use of software without a license is called _____.

Question 20 20. When sensitive, online information is shared or stolen, there is a _____.

Online Privacy & Security Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Business Communications: Help & Review  /  Business Courses
Support