Data Security & Privacy

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Marlenegalea
M
Marlenegalea
Community Contributor
Quizzes Created: 16 | Total Attempts: 93,468
Questions: 5 | Attempts: 860

SettingsSettingsSettings
Data Security & Privacy - Quiz

Study the topic Data Security and Privacy before you try this test


Questions and Answers
  • 1. 

    The Master File

    • A.

      Is the main source of data for an application

    • B.

      Is used to update the records in the Transaction File

    • C.

      Is another copy of the Main File

    • D.

      Is another copy of the Transaction file

    Correct Answer
    A. Is the main source of data for an application
    Explanation
    A Master File (or Main File) is where data is stored but it may be updated using the record of recent changes found on the Transaction File.

    Rate this question:

  • 2. 

    The Transaction file needs to be sorted

    • A.

      So that the data can be backed up

    • B.

      So that the sorted file can be used as backup

    • C.

      To speed up the updating process

    • D.

      All of the above are true

    Correct Answer
    C. To speed up the updating process
    Explanation
    Records in the Transaction File are sorted in the same order as the Master File so that the update process is facilitated and so faster.

    Rate this question:

  • 3. 

    Two methods of physical data security include

    • A.

      Locking doors and drawers of where data is stored.

    • B.

      Using passwords and access levels

    • C.

      Locking backup copies and using firewalls

    • D.

      Using firewalls and encryption

    Correct Answer
    A. Locking doors and drawers of where data is stored.
    Explanation
    Physical security involves things that can be done to keep data secure, apart from those things that are done on the software level (eg passwords)

    Rate this question:

  • 4. 

    Data encryption

    • A.

      Is software form of safeguarding of data

    • B.

      Is very effective in safeguarding data

    • C.

      Involves putting data into a secret code so that if accessed it is meaningless to anyone not having the key to decrypt it with

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Data encryption is a software form of safeguarding data by putting it into a secret code. This code can only be decrypted with a specific key, making the data meaningless to anyone without the key. Therefore, data encryption is very effective in safeguarding data. The given answer, "all of the above," is correct because it encompasses all the statements mentioned, highlighting the various aspects and effectiveness of data encryption.

    Rate this question:

  • 5. 

    Piracy

    • A.

      Is legal if one makes copies of software for himself only

    • B.

      Is illegal copying of software which may be for personal use or for sale

    • C.

      Is impossible if one used product activation techniques

    • D.

      Refers to the stealing of data from protected systems

    Correct Answer
    B. Is illegal copying of software which may be for personal use or for sale
    Explanation
    Any copies that are made in infrignement of a product's copyright are considered pirated copies and so are illegal.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.