Compulsory Internal Assignment (DATA PRIVACY 2)
Compulsory Internal Assignment (DATA PRIVACY 2)
1. Which of the following individuals are unlikely to be considered for the role of Data Protection
Officer?
2. Which is the most actively developing and important areas of cloud computing technology?
Logging
Auditing
Regulatory compliance
None of the mentioned
Access control
Auditing
Authentication
All of the mentioned
4. What type of consumers investing in general data protection need multiple dimensions?
Normal
Business
Office
Third Party
5. Software that address data protection is divided into how many number of segments?
1
2
4
3
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 1/4
4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)
Endpoint Protection
Cloud Privacy Protection
Mobile Device Management
Cloud
7. How many key principles are there under the Data Protection Act 2018?
5
7
10
14
8. After you have finished using someone's personal data, what should you do with it?
9. Platforms are used for safety and protection of information in the cloud.
10. What encompasses the 3 sub-pillars: information privacy, individual privacy, and
communication privacy?
Digital integrity
Digital privacy
Digital secrecy
Digital protection
11. Which of the following is not an appropriate solution for preserving privacy?
Use privacy-focused SE
Use private Browser-window
Disable cookies
Uninstall Antivirus
12. Which of the following is a private Search engine that does not track our search data?
Google
Search Encrypt
Bing
Yahoo
13. The term used for taking care of a user’s name as well as the identity hidden or veiled using a
variety of applications is called
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 2/4
4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)
Pseudonymous
Anonymous
Eponymous
Homonymous
14. Which of the following is NOT an appropriate measure for securing social networking
accounts?
Strong passwords
Link your account with a phone number
Never write your password anywhere
Always maintain a soft copy of all your passwords in your PC
15. You can increase the security on your social media account as you step away from the system
by
signing in
logging out
signing up
logging in
16. The leakage of data that is done purposely or because of the lack of employee’s concern
toward confidential data is called
17. What focuses on the detection and prevention of sensitive data exfiltration and lost data?
19. While working with the storage domain model, CDMI allows for inter-operation of which of the
following clouds?
Public
Private
Hybrid
All of the mentioned
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 3/4
4/16/24, 2:51 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)
20. In the Cloud Data Management Interface (CDMI), the storage space is partitioned into units
called
Containers
Workspace
Replicas
None of the mentioned
SAVE
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzWkI4TmhoQzIyQkkxSUk2bG0rR2xCZ2sxZ1pEREFYYV… 4/4