Enhancing Privacy and Security
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Cryptography is used to protect data in transit and stored information.

True

In Public-Key Encryption, the public key is kept secret and the private key is made public.

False

The government ban on export of strong encryption software was removed in 1990.

False

Anonymizers require permissions to access some web content.

<p>True</p> Signup and view all the answers

Public-Key Encryption is used to provide confidentiality and authentication.

<p>True</p> Signup and view all the answers

Web sites do not pay for privacy audits from companies that check for information.

<p>False</p> Signup and view all the answers

The 1934 Communications Act allowed wiretapping and electronic surveillance by law-enforcement without a court order.

<p>False</p> Signup and view all the answers

The Electronic Communications Privacy Act of 1986 (ECPA) restricts government access to e-mail.

<p>True</p> Signup and view all the answers

The Patriot Act tightened restrictions on government surveillance and wiretapping.

<p>False</p> Signup and view all the answers

The Communications Assistance for Law Enforcement Act of 1994 (CALEA) only applies to traditional landline phones.

<p>False</p> Signup and view all the answers

The National Security Agency (NSA) is prohibited from collecting and analyzing foreign intelligence data related to national security.

<p>False</p> Signup and view all the answers

The Foreign Intelligence Surveillance Act (FISA) does not establish oversight rules for the NSA.

<p>False</p> Signup and view all the answers

More Like This

Kunskapstest
28 questions

Kunskapstest

AmiableFriendship7580 avatar
AmiableFriendship7580
Encryption and Symmetric Cryptography Quiz
17 questions
Privacidad y Seguridad en Internet
16 questions
Use Quizgecko on...
Browser
Browser