Podcast
Questions and Answers
Cryptography is used to protect data in transit and stored information.
Cryptography is used to protect data in transit and stored information.
True
In Public-Key Encryption, the public key is kept secret and the private key is made public.
In Public-Key Encryption, the public key is kept secret and the private key is made public.
False
The government ban on export of strong encryption software was removed in 1990.
The government ban on export of strong encryption software was removed in 1990.
False
Anonymizers require permissions to access some web content.
Anonymizers require permissions to access some web content.
Signup and view all the answers
Public-Key Encryption is used to provide confidentiality and authentication.
Public-Key Encryption is used to provide confidentiality and authentication.
Signup and view all the answers
Web sites do not pay for privacy audits from companies that check for information.
Web sites do not pay for privacy audits from companies that check for information.
Signup and view all the answers
The 1934 Communications Act allowed wiretapping and electronic surveillance by law-enforcement without a court order.
The 1934 Communications Act allowed wiretapping and electronic surveillance by law-enforcement without a court order.
Signup and view all the answers
The Electronic Communications Privacy Act of 1986 (ECPA) restricts government access to e-mail.
The Electronic Communications Privacy Act of 1986 (ECPA) restricts government access to e-mail.
Signup and view all the answers
The Patriot Act tightened restrictions on government surveillance and wiretapping.
The Patriot Act tightened restrictions on government surveillance and wiretapping.
Signup and view all the answers
The Communications Assistance for Law Enforcement Act of 1994 (CALEA) only applies to traditional landline phones.
The Communications Assistance for Law Enforcement Act of 1994 (CALEA) only applies to traditional landline phones.
Signup and view all the answers
The National Security Agency (NSA) is prohibited from collecting and analyzing foreign intelligence data related to national security.
The National Security Agency (NSA) is prohibited from collecting and analyzing foreign intelligence data related to national security.
Signup and view all the answers
The Foreign Intelligence Surveillance Act (FISA) does not establish oversight rules for the NSA.
The Foreign Intelligence Surveillance Act (FISA) does not establish oversight rules for the NSA.
Signup and view all the answers