Looking for CSIT970 (IA25) Security Essentials test answers and solutions? Browse our comprehensive collection of verified answers for CSIT970 (IA25) Security Essentials at moodle.uowplatform.edu.au.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
A ride-sharing app collects location data to: Match riders with drivers, Calculate fares, and Improve its routing algorithm.
Six months later, the app wants to: Sell aggregated location trends to urban planners, and Use individual trip data for targeted ads.
Which combination would comply with Purpose Limitation?
A) Only selling aggregated data
B) Only using data for ads with user consent
C) Both uses if properly disclosed in the original privacy policy
D) Neither use without additional measures
E) Only if data is first anonymized for both purposes
What is the PRIMARY purpose of most website cookies?
A) To encrypt your passwords
Why might someone prefer ambiguous location data (e.g., "near Central Park") over precise GPS coordinates?
A) To reduce battery usage B) To control the extent of information revealed C) To comply with government regulations D) To increase social media engagement E) To hide past activities
What type of malware allows hackers to remotely control a victim’s computer without their knowledge?
A) Ransomware (locks files until payment) B) Backdoor Trojan (secret access) C) Spyware (tracks activity) D) Adware (shows unwanted ads) E) Worm (self-replicating virus)
What risk arises from tagging friends in social media posts?
A) It improves their privacy settings B) It may expose their data without consent C) It gives them free ad-blocking D) It encrypts their location history E) It speeds up their internet
Why is personal data called "public property" online?
A) Because users must pay to keep it private B) Platforms freely share it with governments C) It’s routinely traded/sold without user awareness D) It automatically deletes after 1 year E) Hackers can’t access it
A user is comfortable sharing their vacation photos from 5 years ago but avoids posting current location updates. This illustrates which element of privacy?
A) Extent – Precision of data B) When – Temporal sensitivity C) How – Control over sharing method D) None of the above E) All of the above
Which of the following best defines the purpose of risk management?
A) To eliminate all risks before they happen
B) To guarantee insurance coverage for all losses
C) To develop strategies to prevent or reduce losses and to plan for recovery
D) To ensure legal compliance with disaster recovery standards
E) To delay the impact of potential hazards through reactive decision-making
Which of the following is not one of the five essential steps of the risk management process?
A) Identify the risk
B) Evaluate the risk
C) Monitor and review the plan
D) Document insurance claims
E) Treat the risk
Which of the following best describes a valid multi-factor authentication (MFA) setup?
A) Logging in with two different passwords
B) Scanning a fingerprint and answering a security question
C) Using a username and password only
D) Receiving a one-time password (OTP) via email and SMS
E) Using a smart card and a software certificate on the same device