Ch. 5 Online Privacy Quiz Flashcards

Provide an initial overview of the limits of private-sector collection and use of data.

1
Q

The Children’s Online Privacy Protection Act protects the privacy of children under what age?

A. 5
B. 13
C. 15
D. 18

A

B. 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is regulated under the COPPA (Children’s Online Privacy Act)?

A. children under the age of 12
B. commercial web site operators
C. children’s media organizations
D. all of the above

A

B. commercial web site operators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
The COPPA (Children's Online Privacy Act) covers collection and use of information from children under the age of:
A. 10
B. 12
C. 13
D. 16
A

C. 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the COPPA (Children’s Online Privacy Act), website operators are to collect personal information from children, they must first secure:

A. opt-in consent from the child
B. strong consent from the child
C. parental consent in writing
D. verifiable parental consent

A

D. verifiable parental consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

—— is the US Federal agency with enforcement power of the Children’s Online Privacy and Protection Act?

A. The Department of Health and Human Services. Office of Civil Rights
B. The Federal Trade Commission
C. The Department of Justice
D. None, COPPA is enforced by the state

A

B. The Federal Trade Commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In order to collect personally identifiable information online from a child, a Web site must:

A. provide retroactive notice to parents of the Web sites privacy policies
B. obtain verifiable parental consent
C. anonymize the data
D. obtain retroactive consent

A

B. obtain verifiable parental consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What information may a Web site operator collect from a child without prior parental consent?

A. his name
B. his phone number
C. His email address
D. his age

A

A. his name

C. His email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cases in which PII may be collected from a child without the prior approval of the parent:

A. There is no need to ever obtain Parental Consent
B. Parental consent should be tried to obtained after disclosure
C. Allow Web sites under to conduct research on the demographic of thier
D. May be made allowed under special circumstances to ensure the safety of a child.

A

B. Parental consent should be tried to obtained after disclosure

And

D. May be made allowed under special circumstances to ensure the safety of a child.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following types of Web sites must comply with COPPA?

A. The U.S. Government
B. Only Websites operated in the United States targeting children under the age of 13.
C. All Web sites, regardless of location, targeting children under thr age of 13.
D. All web sites

A

A. The U.S. Government

B. Only Websites operated in the United States targeting children under the age of 13.

C. All Web sites, regardless of location, targeting children under thr age of 13.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are verifiable consent options for Web sites that may disclose information to third parties?

A. Toll free line staffed by professionals to recieve verbal consent over the phone
B. A printable form that may be mailed or faxed back
C. A wen form the parent may fill out
D. Email verification

A

A. Toll free line staffed by professionals to recieve verbal consent over the phone

B. A printable form that may be mailed or faxed back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an additional verifiable consent options for companies that only plan to use children’s PII internally?

A. a Web form the parent may fill out
B. email verification
C. Email Plus, using one email to provide notice and a second email to com consent
D. No consent is needed

A

C. Email Plus, using one email to provide notice and a second email to com consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Children’s Online Privacy Protection Act (COPPA):

A. Prohibits any collection of personal information about children under the age of 13
B. Enables the Federal Trade Commission (FTC) to regulate marketing to children
C. Is an attempt to regulate children’s online access to pornography
D. Restricts the online collection of personal information from children under the age of 13 and without parental consent

A

D. Restricts the online collection of personal information from children under the age of 13 and without parental consent

Practice Exam. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Children’s Online Privacy Protection Act of 1998 (COPPA) requires all Web sites geared towards children to include a privacy policy stating any personal information that may be collected, how and when parental consent should be obtained, and the responsibility the Web site has towards the safety and privacy of the child. This law applies to children under the age of:

A. 10
B. 18
C. 15
D. 13

A

D. 13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A Web beacon is otherwise known as which of the following?

A. Web bug
B. clear GIF
C. spy graphic
D. tracker GIF

A

A. Web bug
B. clear GIF
D. tracker GIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is part of a network or computer system which restricts access to a computer on a network from outside computers. It has the power to control or deny access as well as encrypt and decrypt data.

A. router
B. firewall
C. ethernet adapter
D. encryption software

A

B. firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is the term for the software that adds animation and interactivity on Web pages:

A. HTML
B. Java Script
C. Flash
D. Python

A

C. Flash

17
Q

This is a string of numbers which creates a universally unique ID to identify information such as a computer, file or user:

A. IP address
B. customer ID
C. Social Security Number
D. Global Unique Identifier (GUID)

A

D. Global Unique Identifier (GUID)

18
Q

This is any computer connected to the internet or a network which holds specific resources other computers within that network may need for accessing data or information:

A. router
B. ethernet
C. host
D. database

A

C. host

19
Q

Which of the following is an identifier for a computer and the organization which owns it - specifically within a network?

A. Internet Protocol (IP) Address
B. Globally Unique Identifier (GUID)
C. MAC address
D. Hostname

A

D. Hostname

20
Q

Which of the following is the name for a feature within an electronic document that, when activated, will bring the user to another location, either in the same document or a new one (used widely on the internet) ?

A. Internet Protocol (IP) address
B. hyperlink
C. clear GIF
D. URL

A

B. hyperlink

21
Q

This is the standard computer language used in building Web pages.

A. Hypertext Markup Language (HTML)
B. Java
C. Hypertext Transfer Protocol (HTTP)
D. Flash

A

A. Hypertext Markup Language (HTML)

22
Q

Which of the following are characteristics of Hypertext Transfer Protocol (HTTP)

A. used on the World Wide Web
B. is untraceable
C. a protocol used for hyperlinked documents
D. usually use Port 80 to connect with the host of a network

A

A. used on the World Wide Web
C. a protocol used for hyperlinked documents
D. usually use Port 80 to connect with the host of a network

23
Q

This is when someone other than the data subject uses their personal information “such as name, address, Social Security Number, etc.” to commit fraud:

A. mistaken identity
B. misuse of information
C. identity fraud
D. identity theft

A

D. identity theft

24
Q

This is a set of rules used by computers to communicate packets of data across networks:

A. HTML
B. Internet Protocol (IP)
C. HTTP
D. encryption

A

B. Internet Protocol (IP)

25
Q

333.333.22.1; 163.45.729.22 - the above are examples of what type of address?

A. GUID
B. MAC
C. IP
D. LAN

A

C. IP

26
Q

What is the difference between a static and dynamic IP address

A. a computer with a static IP address has the same address every time. A computer with a dynamic IP address is temporarily assigned an address for each individual session

B. a static IP address does not change within one session while a dynamic IP address changes many times within a session to mask activities

C. a static IP address is temporarily assigned for each individual session. A computer with a dynamic address has the same address every time.

D. None of the above

A

A. a computer with a static IP address has the same address every time. A computer with a dynamic IP address is temporarily assigned an address for each individual session

27
Q

Javascript is defined as:

A. another name for Java
B. a feature on a Web page designed to track user activities
C. a scripting language used to create Web content that is more dynamic with better
user interface
D. the most widely used programming language used on the internet

A

C. a scripting language used to create Web content that is more dynamic with better
user interface

JavaScript is a dynamic programming language that’s used for web development, in web applications, for game development, and lots more. It allows you to implement dynamic features on web pages that cannot be done with only HTML and CSS

28
Q

<p>What is NOT a best practice for organizations managing a social media page?
<br></br>
<br></br>A. Support anonymous positive posts by employees on the organization's social media page to help offset negative posts by customers.
<br></br>B. Monitor activity on the organization's social media page and delete offensive material or information posted by users.
<br></br>C. Direct users to the social media website's privacy policy to clarify how posted information may be used by the social media company.
<br></br>D. Advise users to refrain from posting personal information on the public sections of the organization's social media page.</p>

A

<p>A. Support anonymous positive posts by employees on the organization's social media page and to help offset negative posts by customers.
<br></br>
<br></br>It is not the best practice for organizations managing a social media page to support anonymous posts by employees on the organizations social media page to help offset negative posts by customers. Online social networks build on and expand traditional social networks established in everyday life. Foundations of Information Privacy and Data Protection, p. 139.</p>

29
Q

What does a session cookie on a website do?

A Contains information about what a user is doing online, such as storing online shopping in a basket before placing an order.
B Reveals browser history, so other websites can find out which websites a user has visited.
C Stores browser history, so that a user can trace where they have been on the Internet and revisit those websites.
D Collects personal data, so the website can greet the user by name and reuse settings.

A

A Contains information about what a user is doing online, such as storing online shopping in a basket before placing an order.

30
Q

Which of the following is not a key attribute of security?

A. Confidentiality
B. Integrity
C. Delivery
D. Availability

A

C. Delivery

31
Q

Which type of security controls can be considered in developing a security strategy?

A. Physical, administrative, technical
B. Practice, reactive, distortive
C. Detective, cumulative, reactive
D. Physical, cosmetic, digital

A

A. Physical, administrative, technical.