Podcast
Questions and Answers
Cryptography is used to protect data in transit and stored information.
Cryptography is used to protect data in transit and stored information.
True (A)
In Public-Key Encryption, the public key is kept secret and the private key is made public.
In Public-Key Encryption, the public key is kept secret and the private key is made public.
False (B)
The government ban on export of strong encryption software was removed in 1990.
The government ban on export of strong encryption software was removed in 1990.
False (B)
Anonymizers require permissions to access some web content.
Anonymizers require permissions to access some web content.
Public-Key Encryption is used to provide confidentiality and authentication.
Public-Key Encryption is used to provide confidentiality and authentication.
Web sites do not pay for privacy audits from companies that check for information.
Web sites do not pay for privacy audits from companies that check for information.
The 1934 Communications Act allowed wiretapping and electronic surveillance by law-enforcement without a court order.
The 1934 Communications Act allowed wiretapping and electronic surveillance by law-enforcement without a court order.
The Electronic Communications Privacy Act of 1986 (ECPA) restricts government access to e-mail.
The Electronic Communications Privacy Act of 1986 (ECPA) restricts government access to e-mail.
The Patriot Act tightened restrictions on government surveillance and wiretapping.
The Patriot Act tightened restrictions on government surveillance and wiretapping.
The Communications Assistance for Law Enforcement Act of 1994 (CALEA) only applies to traditional landline phones.
The Communications Assistance for Law Enforcement Act of 1994 (CALEA) only applies to traditional landline phones.
The National Security Agency (NSA) is prohibited from collecting and analyzing foreign intelligence data related to national security.
The National Security Agency (NSA) is prohibited from collecting and analyzing foreign intelligence data related to national security.
The Foreign Intelligence Surveillance Act (FISA) does not establish oversight rules for the NSA.
The Foreign Intelligence Surveillance Act (FISA) does not establish oversight rules for the NSA.
Flashcards are hidden until you start studying