Appendix A. Answer Key

CHAPTER 1 Information Security Overview

  1. C

  2. E

  3. D

  4. C

  5. A

  6. Logical control

  7. C

  8. D

  9. A

  10. E

  11. D

  12. B

  13. C

  14. E

  15. A

CHAPTER 2 Privacy Overview

  1. A

  2. E

  3. C

  4. A

  5. D

  6. D

  7. 8

  8. B

  9. A

  10. B

  11. A

  12. A legitimate business reason

  13. D

  14. B

  15. C

CHAPTER 3 The American Legal System

  1. E

  2. B

  3. A

  4. D

  5. C

  6. A

  7. Stare decisis

  8. D

  9. E

  10. A

  11. Congress

  12. D

  13. 9

  14. C

  15. 94

CHAPTER 4 Security and Privacy of Consumer Financial Information

  1. D

  2. B

  3. A

  4. B

  5. C

  6. Social engineering

  7. A

  8. E

  9. National Bank Act of 1864

  10. B

  11. C

  12. B

  13. 12

  14. B

  15. C

CHAPTER 5 Security and Privacy of Information Belonging to Children and Educational Records

  1. B

  2. A

  3. B

  4. 13

  5. D

  6. B

  7. CIPA

  8. Technical protection measure (TPM)

  9. B

  10. A

  11. C

  12. A

  13. B

  14. B

  15. A

CHAPTER 6 Security and Privacy of Health Information

  1. Reasonable and appropriate

  2. D

  3. 60

  4. 12

  5. D

  6. An organization that performs a health care activity on behalf of a covered entity

  7. C

  8. B

  9. 30

  10. D

  11. A

  12. B

  13. C

  14. E

  15. Unsecured

CHAPTER 7 Corporate Information Security and Privacy Regulation

  1. A

  2. A

  3. To protect ...

Get Legal Issues in Information Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.