[FINALS] CST LAWS FA1

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

43 Terms

1
New cards

The GDPR came into effect in which decade?

2010s

2000s

1990s

1980s

2010s

2
New cards

Which U.S. law addresses protection of patient health information?

  • Homeland Security Act

  • CFAA

  • HIPAA

  • GLBA

HIPAA

3
New cards

A data breach occurs when:

  • A company issues a privacy notice

  • Confidential or protected data is accessed without authorization

  • A new software patch is applied

  • A user updates their password

Confidential or protected data is accessed without authorization

4
New cards

What does “jurisdiction” mean in data privacy?

  • Rights to own property

  • Legal authority over geographical area or data transfers

  • Permission to use software

  • Ability to issue patents

Legal authority over geographical area or data transfers

5
New cards

Which regulation governs personal health information in the healthcare sector?

  • SOX

  • HIPAA

  • PCI DSS

  • CFAA

HIPAA

6
New cards

Which decade saw the first wave of cybersecurity legislation?

  • 1960s

  • 1970s

  • 2010s

  • 1980s–1990s

1980s–1990s

7
New cards

Which type of law punishes online fraud and identity theft?

  • Cybercrime law

  • Environmental law

  • Maritime law

  • Tax law

Cybercrime law

8
New cards

The principle of “data retention” requires:

  • Storing data only as long as legally or operationally needed

  • Keeping data forever

  • Destroying data instantly

  • Collecting data without limits

Storing data only as long as legally or operationally needed

9
New cards

Which of the following is an example of personal data?

  • Daily weather

  • Movie ratings

  • Phone number

  • GDP growth

Phone number

10
New cards

Which law enforces mandatory breach notifications within 72 hours?

  • GDPR

  • HIPAA

  • CFAA

  • GLBA

GDPR

11
New cards

What does DPIA stand for?

  • Data Privacy International Agreement

  • Digital Property Infrastructure Agreement

  • Digital Privacy Identification Act

  • Data Protection Impact Assessment

Data Protection Impact Assessment

12
New cards

Which principle ensures that personal data is processed fairly and lawfully?

  • Availability

  • Transparency and legitimate purpose

  • Encryption

  • Confidentiality

Transparency and legitimate purpose

13
New cards

Which of the following is an example of accountability in practice?

  • Ignoring data subject requests

  • Collecting data without consent

  • Appointing a Data Protection Officer and keeping compliance records

  • Sharing personal data freely

Appointing a Data Protection Officer and keeping compliance records

14
New cards

A hospital encrypts patient data but lets all employees access it without logging. This complies with confidentiality.

  • False

  • True

False

15
New cards

A company transfers EU customer data to another country with no equivalent privacy law, without safeguards. This complies with GDPR.

  • True

  • False

False

16
New cards

A school posts student grades on a public website without consent. This complies with privacy law.

  • False

  • True

False

17
New cards

Which practices comply with data protection principles?

  • Encrypting sensitive data

  • Obtaining informed consent

  • Implementing retention limits

  • Selling personal data secretly

Encrypting sensitive data

Obtaining informed consent

Implementing retention limits

18
New cards

Which are major challenges in enforcing cybersecurity laws?

  • Rapidly evolving technologies

  • Stable international agreements

  • Cross-border jurisdiction conflicts

  • Sophisticated cybercrime techniques

  • Rapidly evolving technologies

  • Cross-border jurisdiction conflicts

  • Sophisticated cybercrime techniques

19
New cards

Which are critical elements of national cybersecurity strategies?

  • Public awareness campaigns

  • Promoting piracy

  • Protecting critical infrastructure

  • Enforcing incident reporting

  • Public awareness campaigns

  • Protecting critical infrastructure

  • Enforcing incident reporting

20
New cards

Which of the following is NOT part of the CIA Triad?

  • Transparency

  • Availability

  • Confidentiality

  • Integrity

  • Transparency

21
New cards

The U.S. Computer Fraud and Abuse Act (CFAA) of 1986 primarily addressed:

  • Medical research ethics

  • International tariffs

  • Computer crimes

  • Intellectual property licensing

  • Computer crimes

22
New cards

Which U.S. Act of 2002 included provisions for critical infrastructure protection?

  • SOX

  • GLBA

  • Homeland Security Act

  • CFAA

  • Homeland Security Act

23
New cards

Which concept involves notifying individuals and authorities after a breach?

  • Data retention

  • Breach notification requirement

  • Encryption

  • Consent

  • Breach notification requirement

24
New cards

Which principle emphasizes giving individuals control over their data?

  • Jurisdiction

  • Consent

  • Availability

  • Integrity

  • Consent

25
New cards

A company processes personal data of EU citizens without GDPR compliance. This is lawful.

False

True

False

26
New cards

An employee leaks client data via personal email. The company later updates policies. The leak still violates privacy law.

  • True

  • False

True

27
New cards

A hospital shares pseudonymized patient data for research with safeguards. This generally complies with privacy law.

  • True

  • False

  • True

28
New cards

Which are examples of cybercrime?

  • Password resetting

  • Identity theft

  • Hacking

  • Malware distribution

  • Identity theft

  • Hacking

  • Malware distribution

29
New cards

Which are key rights of data subjects under privacy laws?

  • Right to access

  • Right to rectification

  • Right to erasure (forgotten)

  • Right to free healthcare

  • Right to access

  • Right to rectification

  • Right to erasure (forgotten)

30
New cards

Which are responsibilities of a Data Protection Officer (DPO)?

  • Monitoring processing activities

  • Selling personal data

  • Advising on compliance

  • Serving as contact point for authorities

  • Monitoring processing activities

  • Advising on compliance

  • Serving as contact point for authorities

31
New cards

Which are benefits of international harmonization of cybersecurity laws?

  • Easier compliance for global businesses

  • Facilitation of trade

  • Increased local isolation

  • Consistent data protection standards

  • Easier compliance for global businesses

  • Facilitation of trade

  • Consistent data protection standards

32
New cards

What does “consent” mean in privacy law?

  • License renewal

  • Judicial authorization

  • Internal company approval

  • Individual permission before data collection or processing

  • Individual permission before data collection or processing

33
New cards

Which of the following best defines “cybersecurity”?

  • Controlling food safety

  • Managing physical assets

  • Regulating water systems

  • Protecting systems, networks, and data from digital attacks

Protecting systems, networks, and data from digital attacks

34
New cards

Which country passed the CFAA?

  • Japan

  • United States

  • Philippines

  • Germany

United States

35
New cards

Which U.S. law was passed after 9/11 to strengthen homeland defense?

  • CFAA

  • Homeland Security Act

  • GLBA

  • HIPAA

Homeland Security Act

36
New cards

Which is a challenge in cross-border data transfer?

  • Different privacy jurisdictions

  • Encryption being illegal

  • Data never leaving one country

  • Same security levels worldwide

  • Different privacy jurisdictions

37
New cards

Which regulation aims to harmonize cybersecurity across EU nations?

  • CFAA

  • PCI DSS

  • HIPAA

  • NIS Directive

  • NIS Directive

38
New cards

Why are privacy laws crucial in the digital age?

  • Because personal data is a valuable commodity and misuse is a risk

  • To encourage sports

  • To promote tourism

  • To reduce industrial pollution

  • Because personal data is a valuable commodity and misuse is a risk

39
New cards

An online service allows users to download their stored personal data upon request. This is a privacy right.

  • False

  • True

  • True

40
New cards

Which are recognized sensitive data categories?

  • Political opinions

  • Biometric identifiers

  • Medical information

  • Daily stock market prices

  • Biometric identifiers

  • Medical information

41
New cards

Which are examples of encryption use in compliance?

  • Protecting stored medical records

  • Publishing personal info openly

  • Securing online payment transactions

  • Protecting communications with

  • SSL/TLS

42
New cards

Which law governs EU member states’ network and information security?

  • HIPAA

  • CFAA

  • NIS Directive

  • PCI DSS

43
New cards