Data Privacy Fundamentals Quiz Answers

Get Data Privacy Fundamentals Quiz Answers

Learn about privacy from 5 prominent cases of data breaches from 2012 to 2015, which highlight vulnerabilities in typical organizations.

  • Get an outline of data privacy laws.
  • Walk away with some guiding principles for how to stay out of trouble.
  • Knowing how to hack a colleague’s password will raise some ethical questions. Justify your decisions in the course exam.

Enroll on Cognitive Class

Module 1: Student loans data breach (Canada)

Question: What does PIPEDA stand for?

  • Personal Incidents of Privacy for Electronic Documents Act
  • Personal Information Protection and Electronic Documents Act
  • Privacy Information of Protections of Electronic Documents Act
  • Privacy Institute of Protections of Electronic Documents Act
  • Privacy Initiative for Protection of Electronic Data Act

Question: Which data privacy federal law does the case study incident fall under in Canada?

  • The Private Citizens Act
  • The Privacy Act
  • The Personal Information Protection and Electronic Data Act (PIPEDA)
  • The Personal Information Protection and Electronic Documents Act (PIPEDA)
  • The Personal Internet Protection and Electronic Documents Act (PIPEDA)

Question: In the case study, why did the ESDC’s Canada Student Loans Program (CSLP) employee make a backup copy of the program information stored in the central computer?

  • He/she knew someone in the data set and wanted to see the value of their loans
  • To sell the data on the dark web
  • To view the data at home
  • To keep the data for personal use after he/she resigned from the organization
  • To protect against an accidental loss or deletion of the files during a data migration

Module 2: Target Corp. (USA)

Question: Under The Personal Information Protection and Electronic Documents Act, PIPEDA, is credit card information considered ‘personal information’?

  • False
  • True

Question: Are bricks and mortar physical stores covered under the Personal Information Protection and Electronic Documents Act, PIPEDA?

  • False
  • True

Question: Is an online commercial business that sells jewelry online and has a maximum of 99 employees covered under the Personal Information Protection and Electronic Documents Act, PIPEDA?

  • False
  • True

Module 3: Think W3 (UK)

Question: According to General Business Law § 899-aa in the Doritex Corp. case, when should a company notify affected individuals and various government agencies of a data breach?

  • In the most expedient time possible
  • Within 7 days of the breach
  • Within 5 business days of the breach
  • Within 30 days of the breach
  • At the end of the financial year

Question: Which of the 8 data protection principles did Think W3 UK infringe in the Case Study?

  • First Principle – Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless at least one of the conditions in Schedule 2 is met and in the case of sensitive personal data, at least one of the conditions set out in Schedule 3 or either of the two Statutory Instruments below is met.
  • Third principle – Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
  • Fourth principle – Personal data shall be accurate and, where necessary, kept up to date.
  • Seventh principle – Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
  • Eighth principle – Personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

Question: Which of the following statements is one of the 7 guiding principles of Privacy by Design

  • The 80/20 Rule, 20% of the team see 80% of the data
  • Data access by pay grade
  • Soft copy before hard copy
  • Reduce waste
  • Proactive not reactive

Module 4: Home Depot (USA)

Question: Hackers deployed custom-built malware on which Home Depot system?

  • Alarm system
  • Surveillance system
  • Self-checkout system
  • Loyalty card system
  • Company Intranet

Question: What can companies do to prevent hacks?

  • Limit the number of password attempts in a short period
  • Increase the number of users on the platform
  • Pay lawyers to litigate any attempts at hacking
  • Host the apps and websites on international servers
  • Encourage employees to save their passwords in a ‘Passwords’ folder on the company network

Question: From what you learnt in the ‘Tips for strong passwords’ section, which of these is considered a strong password?

  • 123123
  • Passw0rd1
  • N3wG.UUnniiV3r5iiTeeG.yyorK
  • Mohammed123

Question: How did hackers access the Home Depot network?

  • A vendor’s username and password
  • A vendor’s USB stick
  • An open wifi network
  • A card cloning machine
  • A vendor’s mobile phone

Module 5: Privacy Tips

Question: Which of these is on the list of ‘worst password ideas’?

  • Medical procedures
  • Another family member’s name
  • Made up words
  • Phrase combinations
  • Phrases in another language

Question: In the ’10 Privacy Tips of Companies’ list, on completion of projects, all materials relating to a project should be deleted, __________________

  • including backups.
  • excluding backups.

Final Exam – OneStopParking (USA) and The ‘Justin’ Case Study

Question: Why did OneStopParking put off the website update?

  • Because the update broke portions of the website
  • Because the website was programmed to do automatic updates
  • Because no one received the notification about an update
  • Because the web administrator was on maternity leave
  • Because no one knew how to do the update

Question: True or false? OneStopParking was able to determine exatly which customers were affected by the breach:

  • True
  • False

Question: How many days after OneStopParking learned about the breach did they remedy the situation?

  • 6 days
  • 21 days
  • 15 days
  • 17 days
  • 3 days

Question: Based on what you have learnt in this course, which of the following options is a good Privacy by Design feature in a database system?

  • the database system auto saves passwords in the browser
  • the database system allows multiple attempts after an incorrect password entry
  • the database system include historical personal customer data that no one uses
  • the database system prompts administrators to change the password regularly
  • the database system lets administrators recycle passwords

Question: The company privacy policy clearly states that password problems of this nature should be reported to the IT Director immediately. Should you help Justin with his password problem?

  • Yes – The request seems reasonable as long as you guess the correct password in under 5 attempts.
  • No – The request seems unethical and you should advise Justin to report his password problem.
  • No – The request seems unethical and you should not get involved.
  • No – The request seems unethical and you should report Justin for his irresponsible password practices.
  • Yes – You have the skills to help Justin with his password problem, you should offer your assistance without question.


We hope you know the correct answers to Data Privacy Fundamentals If Queslers helped you to find out the correct answers then make sure to bookmark our site for more Course Quiz Answers.

If the options are not the same then make sure to let us know by leaving it in the comments below.

Course Review:

In our experience, we suggest you enroll in this and gain some new skills from Professionals completely free and we assure you will be worth it.

This course is available on Cognitive Class for free, if you are stuck anywhere between quiz or graded assessment quiz, just visit Queslers to get all Quiz Answers and Coding Solutions.

More Courses Quiz Answers >>

Building Cloud Native and Multicloud Applications Quiz Answers

Accelerating Deep Learning with GPUs Quiz Answers

Blockchain Essentials Cognitive Class Quiz Answers

Deep Learning Fundamentals Cognitive Class Quiz Answers

Hadoop 101 Cognitive Class Answers

Machine Learning With R Cognitive Class Answers

Machine Learning with Python Cognitive Class Answers

Leave a Reply

Your email address will not be published.