logo

Crowdly

Browser

Add to Chrome

CSIT970 (IA25) Security Essentials

Looking for CSIT970 (IA25) Security Essentials test answers and solutions? Browse our comprehensive collection of verified answers for CSIT970 (IA25) Security Essentials at moodle.uowplatform.edu.au.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

A

ride-sharing app collects location data to: Match riders with drivers,  Calculate fares, and Improve its routing

algorithm.

Six

months later, the app wants to: Sell aggregated location trends to urban

planners, and  Use individual trip data

for targeted ads.

Which

combination would comply with Purpose Limitation?

A)

Only selling aggregated data

B)

Only using data for ads with user consent

C)

Both uses if properly disclosed in the original privacy policy

D)

Neither use without additional measures

E)

Only if data is first anonymized for both purposes

View this question

What is the PRIMARY purpose of most website cookies?

A) To encrypt your passwords

B) To block hackers from the site

C) To personalize ads based on your activity

D) To increase internet speed

E) To delete your browsing history automatically

0%
0%
0%
0%
0%
View this question

Why might someone prefer

ambiguous location data (e.g., "near Central Park") over precise GPS

coordinates?

A) To reduce battery usage

B) To control the extent of information revealed

C) To comply with government regulations

D) To increase social media engagement

E) To hide past activities

0%
0%
0%
0%
0%
View this question

What

type of malware allows hackers to remotely control a victim’s computer without

their knowledge?

A)

Ransomware (locks files until payment)

B) Backdoor Trojan (secret access)

C) Spyware (tracks activity)

D) Adware (shows unwanted ads)

E) Worm (self-replicating virus)

0%
0%
0%
0%
0%
View this question

What risk arises from tagging friends in social media posts?

A) It improves their privacy settings

B) It may expose their data without consent

C) It gives them free ad-blocking

D) It encrypts their location history

E) It speeds up their internet

View this question

Why is personal data called "public property" online?

A) Because users must pay to keep it private

B) Platforms freely share it with governments

C) It’s routinely traded/sold without user awareness

D) It automatically deletes after 1 year

E) Hackers can’t access it

0%
0%
0%
0%
0%
View this question

A user is comfortable sharing their vacation photos from 5 years ago

but avoids posting current location updates. This illustrates which element of

privacy?

A) Extent – Precision of data

B) When – Temporal sensitivity

C) How – Control over sharing method

D) None of the above

E) All of the above

View this question

Which of the following best defines the purpose of risk management?

A) To eliminate all risks before they happen

B) To guarantee insurance coverage for all losses

C) To develop strategies to prevent or reduce losses and to plan for recovery

D) To ensure legal compliance with disaster recovery standards

E) To delay the impact of potential hazards through reactive decision-making

View this question

Which of the following is not one of the five essential steps of the risk management process?

A) Identify the risk

B) Evaluate the risk

C) Monitor and review the plan

D) Document insurance claims

E) Treat the risk

View this question

Which of the following best describes a valid multi-factor authentication (MFA) setup?

A) Logging in with two different passwords

B) Scanning a fingerprint and answering a security question

C) Using a username and password only

D) Receiving a one-time password (OTP) via email and SMS

E) Using a smart card and a software certificate on the same device

0%
0%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.uowplatform.edu.au?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome