Privacy and Data Protection November 29, 2023 Contents Results - #1. 1. What is the primary purpose of privacy in the context of the internet? a) To limit access to personal information a) To limit access to personal information b) To encourage data sharing b) To encourage data sharing c) To promote targeted advertising c) To promote targeted advertising d) To increase online visibility d) To increase online visibility #2. 2. Which of the following is an example of personally identifiable information (PII)? a) Favorite color a) Favorite color b) Pet's name b) Pet's name c) Home address c) Home address d) Favorite movie d) Favorite movie #3. 3. What does GDPR stand for in the context of data protection? a) General Digital Privacy Regulation a) General Digital Privacy Regulation b) Global Data Protection Requirement b) Global Data Protection Requirement c) General Data Protection Regulation c) General Data Protection Regulation d) General Data Privacy Requirement d) General Data Privacy Requirement #4. 4. Which regulatory framework provides a comprehensive approach to data protection and privacy for individuals in the European Union? a) HIPAA a) HIPAA b) COPPA b) COPPA c) CCPA c) CCPA d) GDPR d) GDPR #5. 5. What is the purpose of a privacy policy on a website? a) To sell user data a) To sell user data b) To inform users about data collection and usage practices b) To inform users about data collection and usage practices c) To prevent access to the website c) To prevent access to the website d) To display advertisements d) To display advertisements #6. 6. Which of the following is an example of a phishing attack? a) Installing antivirus software a) Installing antivirus software b) Sending deceptive emails to obtain sensitive information b) Sending deceptive emails to obtain sensitive information c) Updating software regularly c) Updating software regularly d) Using a firewall d) Using a firewall #7. 7. What is the primary goal of ransomware attacks? a) Stealing personal information a) Stealing personal information b) Disrupting computer networks b) Disrupting computer networks c) Encrypting data and demanding payment for its release c) Encrypting data and demanding payment for its release d) Gaining unauthorized access to a system d) Gaining unauthorized access to a system #8. 8. Two-factor authentication typically involves: a) Using two different computers a) Using two different computers b) Verifying identity with two separate factors (e.g., password and SMS code) b) Verifying identity with two separate factors (e.g., password and SMS code) c) Sharing login credentials with another user c) Sharing login credentials with another user d) Disabling security features temporarily d) Disabling security features temporarily #9. 9. What is the role of a VPN (Virtual Private Network) in ensuring online privacy? a) Encrypting internet traffic to secure data transmission a) Encrypting internet traffic to secure data transmission b) Providing public access to personal data b) Providing public access to personal data c) Collecting user information for targeted advertising c) Collecting user information for targeted advertising d) Creating a public Wi-Fi network d) Creating a public Wi-Fi network #10. 10. What does the term "cookie" refer to in the context of internet privacy? a) A piece of code that enhances website functionality a) A piece of code that enhances website functionality b) A small text file stored on a user's device containing information about their online activity b) A small text file stored on a user's device containing information about their online activity c) A security feature that protects against malware c) A security feature that protects against malware d) A virtual currency for online transactions d) A virtual currency for online transactions #11. 11. What is the main purpose of end-to-end encryption? a) Hiding the user's identity a) Hiding the user's identity b) Securing communication so that only the intended recipients can access the content b) Securing communication so that only the intended recipients can access the content c) Blocking access to websites c) Blocking access to websites d) Enhancing internet speed d) Enhancing internet speed #12. 12. Which of the following statements is true about the Children's Online Privacy Protection Act (COPPA)? a) It regulates online privacy for adults a) It regulates online privacy for adults b) It focuses on protecting the online privacy of children under 13 years old b) It focuses on protecting the online privacy of children under 13 years old c) It applies only to social media platforms c) It applies only to social media platforms d) It encourages the sharing of personal information by children d) It encourages the sharing of personal information by children #13. 13. What is the term for the unauthorized access and use of information for financial gain, often involving stealing login credentials? a) Phishing a) Phishing b) Ransomware b) Ransomware c) Identity theft c) Identity theft d) DDoS attack d) DDoS attack #14. 14. Which of the following is an example of a strong password? a) Password123 a) Password123 b) abcdef b) abcdef c) P@ssw0rd! c) P@ssw0rd! d) User9876 d) User9876 #15. 15. What is the primary purpose of a firewall in cybersecurity? a) Encrypting data transmission a) Encrypting data transmission b) Preventing unauthorized access to a network b) Preventing unauthorized access to a network c) Detecting phishing emails c) Detecting phishing emails d) Improving internet speed d) Improving internet speed #16. 16. In the context of online privacy, what does the acronym VPN stand for? a) Virtual Personal Network a) Virtual Personal Network b) Very Private Network b) Very Private Network c) Virtual Public Network c) Virtual Public Network d) Virtual Private Network d) Virtual Private Network #17. 17. Which of the following is an example of a biometric authentication method? a) Password a) Password b) Fingerprint recognition b) Fingerprint recognition c) PIN c) PIN d) Security question d) Security question #18. 18. What is the purpose of the "Do Not Track" (DNT) feature in web browsers? a) To block all online advertisements a) To block all online advertisements b) To prevent websites from tracking users' online activities b) To prevent websites from tracking users' online activities c) To speed up internet browsing c) To speed up internet browsing d) To allow targeted advertising d) To allow targeted advertising #19. 19. What is the role of a CAPTCHA in online security? a) Encrypting user data a) Encrypting user data b) Identifying human users and preventing automated bots from accessing a website b) Identifying human users and preventing automated bots from accessing a website c) Providing secure online payments c) Providing secure online payments d) Storing login credentials d) Storing login credentials #20. 20. What is the primary concern addressed by the General Data Protection Regulation (GDPR)? a) Online advertising a) Online advertising b) Data breaches and privacy of individuals b) Data breaches and privacy of individuals c) Internet speed c) Internet speed d) Social media usage d) Social media usage #21. 21. What does the acronym HTTPS stand for in the context of internet security? a) HyperText Transfer Protocol Secure a) HyperText Transfer Protocol Secure b) HyperText Transport Protocol Standard b) HyperText Transport Protocol Standard c) High-Efficiency Transfer Protocol for Secure browsing c) High-Efficiency Transfer Protocol for Secure browsing d) HyperText Transmission Privacy System d) HyperText Transmission Privacy System #22. 22. Which of the following is an example of a social engineering attack? a) Installing antivirus software a) Installing antivirus software b) Using a strong password b) Using a strong password c) Trickery to manipulate individuals into divulging confidential information c) Trickery to manipulate individuals into divulging confidential information d) Encrypting data for security d) Encrypting data for security #23. 23. What is the purpose of a privacy screen on a computer or mobile device? a) Enhancing display quality a) Enhancing display quality b) Protecting the device from physical damage b) Protecting the device from physical damage c) Preventing unauthorized individuals from viewing the screen c) Preventing unauthorized individuals from viewing the screen d) Reducing power consumption d) Reducing power consumption #24. 24. What is the primary concern when using public Wi-Fi networks? a) Faster internet speed a) Faster internet speed b) Lack of internet connectivity b) Lack of internet connectivity c) Security risks and potential data interception c) Security risks and potential data interception d) Enhanced privacy protection d) Enhanced privacy protection #25. 25. What is the role of encryption in protecting data during transmission over the internet? a) Accelerating data transfer speed a) Accelerating data transfer speed b) Making data more accessible to unauthorized users b) Making data more accessible to unauthorized users c) Encoding data to prevent unauthorized access c) Encoding data to prevent unauthorized access d) Displaying information on websites d) Displaying information on websites #26. 26. Which of the following is an example of a data breach? a) Regular software updates a) Regular software updates b) Unauthorized access to sensitive information b) Unauthorized access to sensitive information c) Using strong passwords c) Using strong passwords d) Enabling two-factor authentication d) Enabling two-factor authentication #27. 27. How does a secure socket layer (SSL) contribute to online security? a) Enhancing internet speed a) Enhancing internet speed b) Providing a secure connection for transmitting data over the internet b) Providing a secure connection for transmitting data over the internet c) Blocking access to certain websites c) Blocking access to certain websites d) Encrypting stored data on a device d) Encrypting stored data on a device #28. 28. What is the primary purpose of a privacy-focused web browser? a) Displaying more online advertisements a) Displaying more online advertisements b) Collecting user data for targeted advertising b) Collecting user data for targeted advertising c) Minimizing data tracking and enhancing user privacy c) Minimizing data tracking and enhancing user privacy d) Blocking access to certain websites d) Blocking access to certain websites #29. 29. What is the role of a digital signature in online transactions? a) Identifying website authenticity a) Identifying website authenticity b) Verifying the identity of the sender and ensuring the integrity of the message b) Verifying the identity of the sender and ensuring the integrity of the message c) Enhancing internet speed c) Enhancing internet speed d) Preventing access to sensitive information d) Preventing access to sensitive information #30. 30. How does a VPN protect user privacy when browsing the internet? a) By sharing user data with third-party advertisers a) By sharing user data with third-party advertisers b) By encrypting internet traffic, making it difficult for third parties to intercept b) By encrypting internet traffic, making it difficult for third parties to intercept c) By providing access to public Wi-Fi networks c) By providing access to public Wi-Fi networks d) By allowing websites to track user activities d) By allowing websites to track user activities Finish