1.
Section 1
1) TRUE OR FALSE: Protecting personal information is something that only banks and other companies have to be concerned about.
Correct Answer
B. False
Explanation
Refer to page 2 (Section 1, Subsection “IN THIS SECTION”).
2.
Section 1
2) TRUE OR FALSE: If people don’t trust a state department, they don’t have to turn over their personal information in order to use a government service.
Correct Answer
B. False
Explanation
Refer to page 3 (Section 1, Subsection “Public Trust”).
3.
Section 1
3) CHOOSE THE CORRECT ANSWER: Which of the following are good reasons for a state department to protect privacy?
-
The Information Practices Act and other state laws require it.
-
Identity thieves want to steal personal information collected by state agencies.
-
Responding to a privacy breach costs a state department.
-
All of the above.
Correct Answer
D. D
Explanation
Refer to pages 2-3 (Section 1, Subsections “It’s the law!,” “Security Breaches,” and “Identity Theft”).
4.
Section 1
4) FILL IN THE BLANKS: Law enforcement calls ________________ __________________ the crime of our times.
Correct Answer
Identity theft
Explanation
Refer to page 3 (Section 1, Subsection “Identity Theft”).
5.
Section 2
1) TRUE OR FALSE: When an identity thief opens new credit accounts in the victim's name, the victim usually learns about it within a month.
Correct Answer
B. False
Explanation
Refer to page 6 (Section 2, Subsection “New Accounts”).
6.
Section 2
2) FILL IN THE BLANK: Identity theft is stealing someone’s personal information and using it for _____________ purposes.
Correct Answer
Unlawful
Explanation
Refer to page 6 (Section 2, Subsection “IN THIS SECTION”).
7.
Section 2
3) TRUE OR FALSE: The use of someone’s personal information when charged with a crime can be the most difficult type of identity theft for a victim to deal with.
Correct Answer
A. True
Explanation
Refer to page 7 (Section 2, Subsection “Criminal Identity Theft”).
8.
Section 2
4) CHOOSE THE CORRECT ANSWER: Identity theft costs the average victim:
-
$50
-
$6,300
-
$630
-
$6.00
Correct Answer
C. C
Explanation
Refer to page 8 (Section 2, Subsection “Cost of Identity Theft”).
9.
Section 2
5) TRUE OR FALSE: The total cost of identity theft in the U.S. in 2010 was $20 billion.
Correct Answer
B. False
Explanation
Refer to page 8 (Section 2, Subsection “Cost of Identity Theft”) .
10.
Section 2
6) FILL IN THE BLANKS: A key type of information identity thieves use to open new accounts is someone’s ____________ _____________ ______________.
Correct Answer
Social security number
Explanation
Refer to page 6 (Section 2, Subsection “New Accounts”).
11.
Section 3
1) TRUE OR FALSE: A state department can collect personal information for any reasonable purpose.
Correct Answer
B. False
Explanation
Refer to page 11 (Section 3, Subsection “Information Practices Act”).
12.
Section 3
2) CHOOSE THE CORRECT ANSWER: Which of the following are possible penalties for violating the Information Practices Act?
-
A State department could be sued.
-
A State employee could be disciplined or fired.
-
A State employee who steals a department's personal information could be fined $5,000 and sentenced to a year in prison.
-
All of the above.
Correct Answer
D. D
Explanation
Refer to page 12 (Section 3, Subsection “Consequences”).
13.
Section 3
3) FILL IN THE BLANKS: The type of personal information that could trigger a notification if it is acquired by an unauthorized person is name, plus one or more of the following: Social Security number, driver's license or California Identification Card number, or _________ _________ number.
Correct Answer
Financial account
Explanation
Refer to page 13 (Section 3, Subsection “Notice of Security Breach Law”).
14.
Section 3
4) TRUE OR FALSE: A California law prohibits printing Social Security numbers on health plan cards.
Correct Answer
A. True
Explanation
Refer to page 14 (Section 3, Subsection “Social Security Number Confidentiality Act”).
15.
Section 3
5) TRUE OR FALSE: A folder containing job applications, which include the applicants' Social Security numbers, is stolen from a State employee’s car. The employee’s department does not have to notify individuals of this, because the information was not in digital or computerized format.
Correct Answer
B. False
Explanation
Refer to page 14 (Section 3, Subsection “State Policy on Notification”).
16.
Test Your Knowledge: Review
1) If you believe that incoming mail has been stolen from your office, where should you report it FIRST?
a) To your supervisor
b) To your department’s Information Security Officer
c) To the U.S. Postal Inspection Service
d) To the local police department
Correct Answer
A. A
Explanation
Refer to pages 25-26 (Section 4, Subsection “Report Information Security Incidents”).
17.
Test Your Knowledge: Review
2) Which of the following is the strongest, most secure password for access to your computer?
-
FLUFFY
-
9151950
-
ERICKSON
-
HMWC1WC2
Correct Answer
D. D
Explanation
Refer to pages 20-21 (Section 4, Subsection “Protect Personal Information in Workstations”).
18.
Test Your Knowledge: Review
3) Which of the following is the most secure way to get the Social Security numbers of seven people to a co-worker, who is on a business trip, is authorized to have the information, and needs it to do his job?
-
Send the information in an email
-
Call your co-worker and give him the information over the phone
-
Leave the information in a voice mail message on your co-worker’s cell phone
-
Fax the information to your co-worker at his hotel
Correct Answer
B. B
Explanation
Refer to pages 22-23 (Section 4, Subsection “Protect Personal Information in Transit”).
19.
Test Your Knowledge: Review
4) Which of the following would NOT be an information security incident to report to your department's Information Security Officer?
-
Loss of a laptop containing unencrypted information
-
Accidental mailing of an individual's medical records to the wrong person
-
Theft of your purse, which contained a CD with state data on it
-
Theft of a state-owned electric stapler
Correct Answer
D. D
Explanation
Refer to pages 25-26 (Section 4, Subsection “Report Information Security Incidents”).
20.
Test Your Knowledge: Review
5) Which of the following should you do before leaving your workstation for a meeting?
-
Put documents, disks, and other records containing personal information in a drawer or otherwise out of sight
b) Press Ctrl-Alt-Delete and lock your computer
c) Tell your co-worker to keep an eye on your desk
d) Both a and b
Correct Answer
D. D
Explanation
Refer to pages 20-21 (Section 4, Subsection “Protect Personal Information in Workstations”).
21.
Test Your Knowledge: Review
6) A state employee gives a printout of the names, addresses, and driver's license numbers of people who received unemployment benefits to a friend who wants to offer jobs to them. Which of the following are true?
-
The employee may be found guilty of a misdemeanor punishable by up to $5,000 and one year in prison
-
The employee may be fired
-
The employee’s department may be sued
-
The employee will not be punished because his intentions were good
-
A, B, and C
Correct Answer
E. E
Explanation
Refer to page 12 (Section 3, Subsection “Consequences”).