#1
Which of the following is an example of personally identifiable information (PII)?
IP address
ExplanationAn IP address can be used to identify an individual's internet connection.
#2
What is the purpose of a VPN (Virtual Private Network)?
To securely connect to a private network over the internet
ExplanationVPNs create encrypted tunnels for secure communication over the internet, often used to protect privacy and bypass geo-restrictions.
#3
What is two-factor authentication (2FA)?
A security measure requiring two forms of identification to access an account
Explanation2FA adds an extra layer of security by requiring users to provide two different authentication factors, typically something they know (like a password) and something they have (like a smartphone).
#4
What is the purpose of end-to-end encryption?
To encrypt data from the sender to the recipient, making it inaccessible to anyone else
ExplanationEnd-to-end encryption ensures that data remains encrypted throughout its transmission, preventing interception and unauthorized access by intermediaries or eavesdroppers.
#5
What is the purpose of a privacy notice?
To inform individuals about their privacy rights and how their personal data is processed
ExplanationPrivacy notices provide transparent information to individuals regarding the collection, use, and disclosure of their personal data by an organization, empowering them to make informed decisions about their privacy.
#6
What does GDPR stand for in the context of privacy and information security?
General Data Protection Regulation
ExplanationGDPR is a regulation that protects the privacy and personal data of individuals within the European Union.
#7
What is the purpose of encryption?
To hide data from unauthorized access
ExplanationEncryption scrambles data to make it unreadable to anyone without the proper decryption key.
#8
What is the role of a firewall in information security?
To control incoming and outgoing network traffic
ExplanationFirewalls monitor and filter network traffic based on predefined security rules to prevent unauthorized access and malicious activities.
#9
What is a phishing attack?
A social engineering attack to gain sensitive information
ExplanationPhishing attacks use deceptive emails or websites to trick individuals into providing sensitive information like passwords or credit card numbers.
#10
What is the purpose of a privacy policy?
To disclose how the company collects, uses, and protects user data
ExplanationPrivacy policies inform users about the handling of their personal information by detailing data collection, processing, and protection practices.
#11
What does the term 'data minimization' refer to in the context of privacy?
Collecting only the minimum amount of data necessary for a specific purpose
ExplanationData minimization reduces privacy risks by limiting the collection and retention of personal data to what is essential for a particular purpose.
#12
What is a data breach?
An unintentional release of confidential information to an unauthorized person or entity
ExplanationA data breach involves the unauthorized access, disclosure, or exposure of sensitive or confidential information, often resulting in potential harm, such as identity theft or financial loss.
#13
What is a keylogger?
A tool used to capture keystrokes
ExplanationKeyloggers record keystrokes on a computer or mobile device, often used for malicious purposes like stealing passwords.
#14
What does HIPAA regulate?
Healthcare data privacy
ExplanationHIPAA is a law that safeguards sensitive patient healthcare information.
#15
What is the primary purpose of a data breach response plan?
To minimize the impact of a data breach
ExplanationData breach response plans outline procedures to mitigate the damage caused by a breach, including containment, notification, and recovery.
#16
What is the principle of least privilege in information security?
Giving users access only to the resources they need to perform their job functions
ExplanationThe principle of least privilege restricts user access rights to the minimum permissions required to perform necessary tasks, reducing the risk of unauthorized access and potential harm.
#17
What is a vulnerability assessment?
A process of identifying weaknesses in a system's security
ExplanationVulnerability assessments identify and prioritize security vulnerabilities within a system, network, or application to mitigate potential risks and strengthen security defenses.
#18
What is the difference between data privacy and data security?
Data privacy refers to protecting personal information, while data security refers to protecting data from unauthorized access, alteration, or destruction
ExplanationData privacy focuses on ensuring the confidentiality and appropriate use of personal information, while data security encompasses broader protection measures against unauthorized access, theft, or corruption of data.
#19
What does the term 'social engineering' refer to in the context of information security?
A technique for manipulating people into giving up confidential information
ExplanationSocial engineering exploits human psychology to deceive individuals into disclosing sensitive information or performing actions that compromise security, often through persuasion, manipulation, or impersonation.