Imagine you want to send a secret message to a friend using a locked box. Which of the following best describes how data encryption works in protecting your message?
Think about how a locked box protects something from being read by others.
Encryption locks data so only someone with the correct key can unlock and read it, similar to a locked box.
Consider a system where users have different access levels: Admin, Editor, and Viewer. Given the following flowchart, which user type can only view data but cannot edit or delete it?
Start -> Check User Role -> If Admin: Full Access -> If Editor: Edit Access -> If Viewer: View Only -> End
Think about the role that has the least permissions.
Viewers can only see data without making changes, unlike Admins or Editors who have more permissions.
Which of the following scenarios poses the greatest risk to personal data privacy?
Consider what information is sensitive and how public it is.
Posting your full home address publicly exposes sensitive personal information to anyone, increasing privacy risks.
Which data protection method is more effective at preventing unauthorized access to data stored on a lost device?
Think about what protects data even if someone gets physical access to the device.
Encryption protects data by making it unreadable without the key, even if the device is lost or stolen.
You want to share photos with only a select group of friends on a social media platform. Which privacy setting should you choose to ensure only those friends can see your photos?
Consider a setting that limits visibility to your friends but not everyone.
The 'Friends Only' setting restricts photo visibility to your friends, protecting your privacy from the public.