Benefits of using big data include which of the following?
a. Can be obtained from a large variety of sources
b. Low cost to store data
c. Available for data mining as a basis for analytics
d. All of the above
d. All of the above
Which of the following aspects of data mining provide the basis of analytics?
a. Providing transparency
b. Drawing connections
c. Making predictions
d. All of the above
d. All of the above
Which of the following best describes a reason using big data for modern analytics may make it difficult to adhere to Fair Information Privacy Practices?
a. The data may be incomplete
b. No clear notice of data use to the data subject
c. Data may have been disclosed to a third party
d. None of the above
b. No clear notice of data use to the data subject
Which of the following is an example of a data collecting device?
a. Cell phones
b. Street light sensors
c. Car fuel injectors sensors
d. All of the above
d. All of the above
Moore’s Law is used to predict which of the following?
a. Number of transactions performed by a teller machine
b. Increase of the expanding universe
c. Exponential increase of computing power and data
d. All of the above
c. Exponential increase of computing power and data
Gordon Moore, Cofounder of Intel predicted the exponential increase in computing power when he observed the number of transistors on a circuit board doubled every 18 to 24 months.
What is the relationship between Moore’s Law and Big Data?
a. Moore’s Law predicts that Big Data will eventually drop off and become a thing of the past
b. Moore’s Law predicts the amount of data produced doubles about every 12 months
c. Moore’s Law predicts the amount of data collected is equal to the amount of data used
d. None of the above
b. Moore’s Law predicts the amount of data produced doubles about every 12 months
How frequently is data produced predicted to double by 2025?
Data produced is predicted to double every 12 hours at its current rate by 2025.
What are the “3 Vs”?
Characteristics of big data:
An important positive aspect of having a large variety of sources of big data is:
a. The ability to turn data from different sources into more uniform categories for analysis
b. The cycle time to turn data into distinct categories
c. The ability to quickly review the data records
d. None of the above
a. The ability to turn data from different sources into more uniform categories for analysis.
What is Asimov’s Law of Robotics as it pertains to Artificial Intelligence?
A robot:
Which of the following is a privacy related rule added to the rules of Asimov’s Law of Robotics by EPIC founder, Marc Rotenberg?
a. A robot should always reveal the name of the programmer
b. A robot should always reveal the basis of their decisions
c. A robot should always reveal their identities
d. b and c
A robot:
Which of the following is a standard included in Satya Nadella’s design principles for AI designed to help humans?
a. Must be designed for intelligent privacy
b. Must be transparent
c. Includes algorithmic accountability to undo unintended harm
d. All of the above
d. All of the above
d. All of the above
What are the 2 primary security risks related to big data?
2. External hackers
Which of the following is not an important preventive consideration during development of a comprehensive information security plan?
a. Firewalls
b. Surveillance cameras
c. Intrusion detection
d. Threat models
b. Surveillance cameras
d. All of the above
Which of the following is an important standard for limiting collection of personal information?
a. Collection conducted by lawful and fair means
b. Collection conducted at the data subject’s consent, when possible
c. Collection with the data subject’s knowledge, when possible
d. All of the above
d. All of the above
What are the 3 most important standards for limiting use of personal information?
Personal information:
Which of the following is an important standard for ensuring personal information is used for the purpose specified?
a. Used for the purpose initially intended
b. May be used for other purposes when they are compatible with the original purpose intended
c. Should be limited when secondary uses are involved
d. All of the above
d. All of the above
Which of the following is an important theme of Fair Information Principles?
a. Data minimization
b. Additional security measures for big data
c. Deidentification
d. Only a and c
d. Only a and c
Which of the following is not a control that can be used to prevent a big data breach?
a. Access – only employees with a need to know
b. Segregation databases
c. Identify compliance challenges
d. Guiding principles based on best practices
c. Identify compliance challenges
Which of the following is a guiding principle for preventing a big data breach?
a. Legal rules
b. Company policy
c. FIPPs (esp. Collection Limitation, Purpose Specification, and Use Limitation)
d. All of the above
d. All of the above
Which of the following is not a principle for reducing privacy risk?
a. Only collect data necessary
b. Disclose data to third parties without a contract
c. Collect only less sensitive data
d. De-identify data once it is collected
b. Disclose data to third parties without a contract
Which of the following describes the goal of data de-identification, pseudonymization, and anonymization?
a. Gain benefits from analyzing data while suppressing data that can reveal an individual’s identity
b. Reduce costs of marketing by disclosing consumer data to third parties
c. Ensure better information security through encryption
d. Only a and c
a. Gain benefits from analyzing data while suppressing data that can reveal an individual’s identity