Information hiding is to hide from user, details ?
that are relevant to him
that are not relevant to him
that may be maliciously handled by him
that are confidential

1 Answer

Answer :

that may be maliciously handled by him

Related questions

Description : “““.are 'attempts by individuals toobtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above

Last Answer : Phishing

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others.

Description : Which of following are Unethical norms for Investigator? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. All of above E. None of above

Last Answer : D. All of above

Description : Which of following is a not unethical norm for Digital Forensics Investigation? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. To respect the privacy of others.

Last Answer : D. To respect the privacy of others. 

Description : Which of following are Unethical norms for Investigator? A. Uphold any relevant evidence. B. Declare any confidential matters or knowledge. C. Distort or falsify education, training, credentials. D. All of above E. None of above

Last Answer : D. All of above 

Description : Which of the following is a tool in design phase ? Abstraction Refinement Information Hiding All of Above

Last Answer : All of Above

Description : Is there a way to hide "Bob became a fan of Bananas" from my Facebook Home Page without hiding the person?

Last Answer : No. Unfortunately, you can only hide a person or an application/game.

Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails

Last Answer : A. application layer, e-mails

Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above

Last Answer : All of theabove

Description : What occurs in the session layer? a.Data compression and encryption b.MAC address are handled c.binary to decimal conversion d.sessions are created

Last Answer : d.sessions are created

Description : Which of the following statements concerning a CPA's disclosure of confidential client information is ordinarily correct? a. Disclosure should not be made even if such disclosure will protect the CPA's ... consent of the client. d. Disclosure may be made to any government agency without subpoena.

Last Answer : Disclosure may be made to any party on consent of the client.

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : In OSI model, which of the following layer transforms information from machine format into that understandable by user a. application b. session c. presentation d. physical

Last Answer : c. presentation

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : What is a good way to get rid of a whole lot of paper that might contain confidential information?

Last Answer : I am able to burn my documents, but I live out where that’s allowed.

Description : What is an attempt to obtain confidential information from you if the person's identity is false ?

Last Answer : Answer : Attempting to obtain confidential information from you by claiming that the person's identity is false is called phishing scams.

Description : Is google drive safe for confidential information?

Last Answer : For either user data security or legal liability, Google Drive account that is protected by two-factor authentication and a strong password is fairly secure. We can tell from the process that files ... you decide in this article: Is it Safe to Store Sensitive Data like Passwords on Google Drive?

Description : Why is it important to deal with confidential client information under the data protection act?

Last Answer : Need answer

Description : How can I be sure my information is confidential when I use data recovery services?

Last Answer : Usually most data recovery services are under a non-disclosure they are also conducted in secure labs with controlled access to ensure the confidentiality of your data. Contracts will be wrote up to help protect your systems also.

Description : Which of the following best describes the passing of confidential information from a client to its auditor? The information: a. Should in no circumstances be conveyed to third parties. b. Is not ... d. Should be conveyed to the public if it affects the "correctness" of the financial statement

Last Answer : Is not legally protected and can be subpoenaed by a competent cour

Description : A professional accountant has a professional duty or right disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose to ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to the Bureau of Internal Revenue any fraudulent scheme committed by the client on payment of income tax

Description : A professional accountant has a professional duty or right to disclose confidential information in each of the following, except: a. To disclose to BIR fraudulent scheme committed by the client on payment ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to BIR fraudulent scheme committed by the client on payment of income tax

Description : In which of the following circumstances would a CPA be bound by ethics to refrain from disclosing any confidential information obtained during the course of a professional engagement? a. The CPA is ... the PICPA. d. An inquiry by a disciplinary body of PICPA requests confidential client information

Last Answer : A major stockholder of a client company seeks accounting information from the CPA after management declined to disclose the requested information

Description : A CPA in public practice shall not disclose any confidential client information without the specific consent of the client. The confidentiality rule is violated if CPA disclosed information without client' ... s largest stockholder. d. Complaint filed with the trial board of the Board of Accountancy

Last Answer : Request by client's largest stockholder.

Description : Which of the following best describes the passing of confidential information from a client to its auditor? The information: a. Should in no circumstances be conveyed to third parties. b. Is not ... d. Should be conveyed to the public if it affects the "correctness" of the financial statements

Last Answer : Is not legally protected and can be subpoenaed by a competent court.

Description : A professional accountant has a professional duty or right to disclose confidential information in each of the following, except: a. To comply with technical standards and ethics requirements. b. To disclose ... body d. To respond to an inquiry or investigation by a member body or regulatory body

Last Answer : To disclose to BIR fraudulent scheme committed by the client on payment of income tax.

Description : When providing consulting services, the CPA acts primarily as a(n): a. Independent practitioner. b. Expert on compliance with industry standards. c. Objective advisor on the use of information. d. Confidential reviewer

Last Answer : Objective advisor on the use of information

Description : Without the consent of the client, a CPA should not disclose confidential information contained in working papers to a: a. Voluntary quality control review board. b. CPA firm that has purchased the ... . c. National court that has issued a valid subpoena. d. Disciplinary body created under statute.

Last Answer : CPA firm that has purchased the CPA’s accounting practice.

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams

Description : valuer should not use or divulge to other clients or any other party any confidential information about the ______ company. a) subject b) client c) public d) listed

Last Answer : a) subject

Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing

Last Answer : b. Ask people to fill out and return a fake letter using postal mail

Description : What is clickjacking ? (1) Malicious technique of tricking Web usear into revealing confidential information (2) A device that sends and receives data in a bit second (3) A form of Computer Engineering (4) A digital process that is used to display an image on monitor

Last Answer : Malicious technique of tricking Web usear into revealing confidential information

Description : An applicant making request for information  a) Should be give the reason why the information sought for b) Shall not be give any reason for requesting the information or any other personal  details except those that may be necessary for contacting him. c) None of these

Last Answer : b) Shall not be give any reason for requesting the information or any other personal  details except those that may be necessary for contacting him.

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is correct: a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. b) Steganography is the study of hiding the very existence of a ... of the message itself like microdots or invisible ink. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : What are the drawbacks for Layers? a) It is often necessary to pass data through many layers, which can slow performance significantly b) Layers support information hiding c) Multi-layered programs ... tend to be implemented through a series of calls across layers d) None of the mentioned

Last Answer : Multi-layered programs can be hard to debug because operations tend to be implemented through a series of calls across layers

Description : In particular, layers have which of the following characteristics? a) Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion b) Layers doesn’t support information hiding c) Layers are constrained to use only above layers d) All of the mentioned

Last Answer : Layers are by definition highly cohesive, thus satisfying the Principle of Cohesion

Description : Information hiding:

Last Answer : A programmer who reuses a software component needs only to understand the nature of the component and its interface . It is not necessary for the programmer to have detailed information ... techniques used to implement the component. Thus the interconnectedness between software system is reduced.

Description : Which of the following is not related to information security on the Internet? (A) Data Encryption (B) Water marking (C) Data Hiding (D) Information Retrieval

Last Answer : (D) Information Retrieval

Description : Cohesion is an extension of: (A) Abstraction concept (B) Refinement concept (C) Information hiding concept (D) Modularity

Last Answer : (C) Information hiding concept 

Description : When a co-worker is blessed with a son and he desires some financial assistance from you, then how would you extend your co-operation to him? Options: A) You just formally ask for any sort of ... relationship C) You try to hide your face during this time D) You put forward some lame excuses

Last Answer : B) You extend all types of support as you have intimate relationship 

Description : A is accused of murder of B by beating him whatever is said or done by A or B or by  standers at beating or so shortly before or after it as to form part of transaction is a  relevant fact under section- a) Section 6 b) Section 9 c) Section 12 d) Section 8

Last Answer : a) Section 6

Description : I once handled cash, then inadvertently touched my mouth with my hands. Within an hour, my upper lip started to burn and swell. What do you think may have caused my lip to get irritated and swell up?

Last Answer : First, do you have any known allergies?

Description : Which of the following precautions should be taken when a blown fuse, rated at 10 amperes, is replaced? A. Short out the fuse before removing it from the circuit. B. Use needle-nose pliers to ... D. Fuses of 10 ampere rating and less are virtually harmless when energized and may be handled freely.

Last Answer : Answer: C

Description : Do you give out your contact information at work casually? How is that handled at your job? Are you careful to make sure access to it is on a need-to-know basis?

Last Answer : She was given a specific directive and was trying to fulfill that. I'm not quite sure what you think she will do with it that is inappropriate. Every job that I have had has required ... there is extremely sensitive, personal information being disclosed, you don't really need to worry about that.

Description : A Privacy Impact Assessment (PIA) is an analysis of how information is handled?

Last Answer : All of the above

Description : Information is handled in the computer by _ __ a. Electrical digit b. Electrical component c. Electronic bit d. None of these

Last Answer : b. Electrical component

Description : According to the principles of ICH GCP what should be recorded, handled, and stored in a way that allows its accurate reporting, interpretation and verification?  A. Data entered into the case report form  B. Source information  C. All clinical trial information  D. Essential documents

Last Answer : C. All clinical trial information