0% found this document useful (0 votes)
65 views4 pages

Compulsory Internal Assignment (DATA PRIVACY 2)

Uploaded by

Ramaiah Selvam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views4 pages

Compulsory Internal Assignment (DATA PRIVACY 2)

Uploaded by

Ramaiah Selvam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

Compulsory Internal Assignment (CBCS SEMESTER


PATTERN) Upto C23 Batch

Welcome : SANGEETH P T (A22105PCI6110)


Subject Name : DATA PRIVACY(SPCI205) - Assessment - 2 Menu

1. Which of the following individuals are unlikely to be considered for the role of Data Protection
Officer?

Commercial Director, CEO, IT Manager


CEO, Risk Manager, Compliance Manager
CEO, General Manager, Compliance Manager
Compliance Manager, General Manager, IT Manager

2. Which is the most actively developing and important areas of cloud computing technology?

Logging
Auditing
Regulatory compliance
None of the mentioned

3. Which of the following is a key mechanism for protecting data?

Access control
Auditing
Authentication
All of the mentioned

4. What type of consumers investing in general data protection need multiple dimensions?

Normal
Business
Office
Third Party

5. Software that address data protection is divided into how many number of segments?

1
2
4
3

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 1/4
4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

6. Which segment contributes to protection of data on a device?

Endpoint Protection
Cloud Privacy Protection
Mobile Device Management
Cloud

7. How many key principles are there under the Data Protection Act 2018?

5
7
10
14

8. After you have finished using someone's personal data, what should you do with it?

Pass it on to someone else


Give it back to the owner
Securely delete or destroy it
Throw it out

9. Platforms are used for safety and protection of information in the cloud.

Cloud workload protection platforms


Cloud security protocols
AWS
One Drive

10. What encompasses the 3 sub-pillars: information privacy, individual privacy, and
communication privacy?

Digital integrity
Digital privacy
Digital secrecy
Digital protection

11. Which of the following is not an appropriate solution for preserving privacy?

Use privacy-focused SE
Use private Browser-window
Disable cookies
Uninstall Antivirus

12. Which of the following is a private Search engine that does not track our search data?

Google
Search Encrypt
Bing
Yahoo

13. The term used for taking care of a user’s name as well as the identity hidden or veiled using a
variety of applications is called

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 2/4
4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

Pseudonymous
Anonymous
Eponymous
Homonymous

14. Which of the following is NOT an appropriate measure for securing social networking
accounts?

Strong passwords
Link your account with a phone number
Never write your password anywhere
Always maintain a soft copy of all your passwords in your PC

15. You can increase the security on your social media account as you step away from the system
by

signing in
logging out
signing up
logging in

16. The leakage of data that is done purposely or because of the lack of employee’s concern
toward confidential data is called

Ill-intentional data leakage


Malfunctioned in database
A malfunction in online data
Ill-intension of an outsider

17. What focuses on the detection and prevention of sensitive data exfiltration and lost data?

Data loss prevention


Data loss measurement
Data stolen software
Data leak prevention

18. Which of the following is not done by cyber criminals?

Unauthorized account access


Mass attack using Trojans as botnets
Email spoofing and spamming
Report vulnerability in any system

19. While working with the storage domain model, CDMI allows for inter-operation of which of the
following clouds?

Public
Private
Hybrid
All of the mentioned

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 3/4
4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)

20. In the Cloud Data Management Interface (CDMI), the storage space is partitioned into units
called

Containers
Workspace
Replicas
None of the mentioned

SAVE

www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 4/4

You might also like