Top 40 ISI Quiz Questions With Answers

Top 40 ISI Quiz Questions With Answers

Welcome to our guide on “ISI” (Indian Statistical Institute), a renowned institution renowned for its pioneering work in statistical research and education. Established in 1931 by the visionary statistician Prasanta Chandra Mahalanobis, ISI has been a beacon of excellence in the field of statistics.

In this blog, we’ll delve into the history, academic programs, and contributions of ISI. From its inception in Kolkata to its present-day status as a leading institution, ISI has played a crucial role in shaping the landscape of statistical sciences in India and beyond.

ISI offers a wide range of academic programs, including undergraduate, postgraduate, and doctoral degrees, as well as specialized courses and workshops. Whether you’re interested in theoretical statistics, applied mathematics, computer science, or economics, ISI provides a platform for learning and research.

Moreover, ISI has made significant contributions to various interdisciplinary fields, including computer science, economics, and social sciences. Its alumni and faculty members have made groundbreaking discoveries and advancements, further solidifying ISI’s reputation as a hub of intellectual excellence.

So, let’s move on to the quiz questions with answers.

  1. Q1. True or False? Children's Internet Protection Act (CIPA) does not provide for any additional funds to schools and libraries for the purchase of mechanisms to protect children from explicit content. Conditions of CIPA are attached to grants and the use of E-Rate discounts.

    Select one:
    a. True
    b. False

  2. Q2. True or False? The Children's Internet Protection Act (CIPA) defines criteria for determining whether materials are considered “inappropriate matter” for children.

    Select one:
    a. True
    b. False

  3. Q3. Which of the following established the Public Company Accounting Oversight Board (PCAOB)?

    Select one:
    a. Sarbanes- Oxley (SOX) Act
    b. Federal Information Security Management Act (FISMA)
    c. Gramm-Leach-Bliley Act (GLBA)
    d. Red Flags Rule (RFR)

  4. Q4. Which of the following is a federal law that addresses concerns about children's access to explicit content (such as pornography) online at schools and libraries by requiring the use of Internet filters as a condition of receiving federal funds?

    Select one:
    a. Children's Internet Protection Act (CIPA)
    b. Children's Online Privacy Protection Act (COPPA)
    c. California Consumer Privacy Act (CCPA)
    d. Red Flags Rule (RFR)

  5. Q5. Which of the following has a Section 302 that requires the CEO and CFO to personally certify the truthfulness and accuracy of financial reports?

    a. Gramm-Leach-Bliley Act (GLBA)
    b. Health Insurance Portability and Accountability Act (HIPAA)
    c. California Consumer Privacy Act
    d. Sarbanes-Oxley (SOX) Act

  6. Q6. True or False? The Health Insurance Portability and Accountability Act (HIPAA) Security Rule applies only to protected health information (PHI), not electronic PHI (ePHI).

    Select one:
    a. True
    b. False

  7. Q7. True or False? The Cybersecurity Information Sharing Act (CISA) provides legal boundaries for the sharing of sensitive
    cybersecurity information within and between the private and government sectors.

    Select one:
    a. True
    b. False

  8. Q8. The Sarbanes-Oxley (SOX) Act of 2002:

    Select one:
    a. is a European Union law.
    b. facilitates the development and ongoing monitoring of required minimum controls to protect federal information systems and data.
    c. helps citizens maintain their health insurance coverage.
    d. mandated many reforms to enhance corporate responsibility, enhance financial disclosures, and prevent fraud.

  9. Q9. True or False? An organization's internal policies should define what controls must be deployed to meet regulators' expectations.

    Select one:
    a. True
    b. False

  10. Q10. True or False? The Children's Internet Protection Act (CIPA) requires organizations to get parents' verifiable consent before
    collecting information from their children.

    Select one:
    a. True
    b. False

  11. Q11. True or False? A regulatory agency is a public or government agency that has authority over some area of activity in a regulatory or supervisory capacity.

    Select one:
    a. True
    b. False

  12. Q12. True or False? Except under limited classes of information, the Children's Online Privacy Protection Act (COPPA) requires that parents be notified before data is collected from their children.

    Select one:
    a. True
    b. False

  13. Q13. True or False? The Cybersecurity Information Sharing Act (CISA) expressly prohibits private companies from attacking or “hacking back” in response to a cyberattack.

    Select one:
    a. True
    b. False

  14. Q14. True or False? The California Consumer Privacy Act (CCPA) was one of the first state laws to significantly expand the definition of “personal information.”

    Select one:
    a. True
    b. False

  15. Q15. Which key privacy concept of the California Consumer Privacy Act (CCPA) involves the idea that an organization should not collect more information from a consumer than is needed to provide a product or service?

    Select one:
    a. Full disclosure
    b. Limited use of personal data
    c. Informed consent
    d. Opt-in/opt-out

  16. Q16. True or False? Noncompliance with the Payment Card Industry Data Security Standard (PCI DSS) can result in a merchant not being allowed to accept payment cards.

    Select one:
    a. True
    b. False

  17. Q17. The General Data Protection Regulation (GDPR) brings greater obligations on companies processing and handling personal data of individuals who live in:

    Select one:
    a. the European Union.
    b. the United States.
    c. North America.
    d. Asia Pacific countries.

  18. Q18. The Cybersecurity Information Sharing Act (CISA):

    Select one:
    a. solves a core problem in which organizations are reluctant to share cybersecurity information that may expose them to civil or criminal liability, embarrassment, and loss of trust.
    b. is the result of the Public Company Account Reform and Investor Protection Act and Corporate Accountability and Responsibility Act.
    c. provides authorization to use offensive measures to protect information systems and data.
    d. has three principal parts: Financial Privacy Rule, Safeguards Rule, and pretexting provisions.

  19. Q19. Which of the following was implemented in January 2020, allows consumers the right to find out who has access to their personal data, and enables consumers to stop data from being sold or transferred to third parties through an opt-out function?

    Select one:
    a. Children's Internet Protection Act (CIPA)
    b. Children's Online Privacy Protection Act (COPPA)
    c. California Consumer Privacy Act (CCPA)
    d. Red Flags Rule (RFR)

  20. Q20. True or False? The primary purpose of the Gramm-Leach-Bliley Act (GLBA) was to restore public confidence in the financial
    reporting of publicly traded companies.

    Select one:
    a. True
    b. False

  21. Q21. Which of the following is not part of Federal Information Security Management Act (FISMA) compliance?

    Select one:
    a. The appointed inspector general of the agency under examination performs a separate, annual evaluation.
    b. The annual evaluation tests the value of the agency's IT security policies, procedures, and practices.
    c. The annual evaluation tests a subset of the agency's information systems.
    d. If no inspector general exists in the agency under examination, the agency deputy director performs the annual evaluation.

  22. Q22. True or False? Federal agencies are regulators and therefore do not need to be in compliance with federal regulations.

    Select one:
    a. True
    b. False

  23. Q23. True or False? In the United States, after acts of Congress become laws, various government agencies create and enforce the federal regulations authorized by those acts.

    Select one:
    a. True
    b. False

  24. Q24. True or False? The National Institute of Standards and Technology (NIST) standards apply to private sector information systems.

    Select one:
    a. True
    b. False

  25. Q25. True or False? An organization's policies should follow a framework that is easily understood and promotes compliance.

    Select one:
    a. True
    b. False

  26. Q26. The Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA):

    Select one:
    a. is primarily concerned with protected health information (PHI).
    b. requires websites and other online services aimed at children less than 13 years of age to comply with specific requirements of the law.
    c. requires financial institutions to develop an information security policy to consider the nature and sensitivity of the information they handle.
    d. addresses concerns about children's access to explicit content online.

  27. Q27. Wen is an auditor. He is auditing a large mortgage company based in the United States. He is determining whether the company has consistently and adequately provided privacy notices to its customers and is abiding by any customer's choice to limit the sharing of their personal information. Against which of the following is Wen evaluating compliance?

    Select one:
    a. Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA)
    b. Financial Privacy Rule of the Gramm-Leach-Bliley Act (GLBA)
    c. Red Flags Rule (RFR)
    d. Federal Information Security Management Act (FISMA)

  28. Q28. True or False? Under the Health Insurance Portability and Accountability Act (HIPAA), the term “health care provider” refers to the
    entity that pays the cost for medical care.

    Select one:
    a. True
    b. False

  29. Q29. Isabella is an auditor. She is performing an audit of an investment banking firm in the United States that must comply with
    regulations put forth by the Federal Trade Commission (FTC). As part of her audit, she is ensuring the firm is adequately protecting consumer financial information. Which law has the biggest impact on Isabella's audit?

    Select one:
    a. Sarbanes-Oxley (SOX) Act
    b. Health Insurance Portability and Accountability Act (HIPAA)
    c. Gramm-Leach-Bliley Act (GLBA)
    d. California Consumer Privacy Act (CCPA)

  30. Q30. Various government agencies create and enforce federal regulations authorized by laws. Which of the following is not a government agency that enforces regulations?

    Select one:
    a. Food and Drug Administration (FDA)
    b. Environmental Protection Agency (EPA)
    c. U.S. Securities and Exchange Commission (SEC)
    d. National Institute of Standards and Technology (NIST)

  31. Q31. The __ tasked the National Institute of Standards and Technology (NIST) to develop and set standards and guidelines that
    apply to federal information systems.

    Select one:
    a. Sarbanes-Oxley (SOX) Act
    b. Gramm-Leach-Bliley Act (GLBA)
    c. Red Flags Rule
    d. Federal Information Security Management Act (FISMA)

  32. Q32. True or False? Pretexting is a method of social engineering.

    Select one:
    a. True
    b. False

  33. Q33. Which of the following is not an act of Congress signed into law?

    Select one:
    a. Cybersecurity Information Sharing Act (CISA) of 2015
    b. Sarbanes-Oxley (SOX) Act
    c. Health Insurance Portability and Accountability Act (HIPAA)
    d. Payment Card Industry Data Security Standard (PCI DSS)

  34. Q34. What is not true of the Red Flags Rule (RFR)?

    Select one:
    a. The RFR was developed to instruct the Department of Homeland Security (DHS) to take measures designed to strengthen cybersecurity in the federal government and at federal agencies.
    b. The term “red flag” refers to having processes that look for suspicious indicators of identity theft and to “flag” those accounts for further review and verification of customer identity.
    c. An RFR program must include a process to identify the red flags of identity theft that may occur in opening and accessing an account.
    d. An RFR program should have policies and training to detect identity theft and red flags accounts.

  35. Q35. True or False? Under the Health Insurance Portability and Accountability Act (HIPAA), covered entities include health plans.

    Select one:
    a. True
    b. False

  36. Q36. Margaret wants to withdraw funds from her personal savings account. She presents a passport to the bank teller. The teller does not believe the passport belongs to Margaret. Which of the following provides guidance for addressing this situation?

    Select one:
    a. Payment Card Industry Data Security Standard (PCI DSS)
    b. Red Flags Rule (RFR)
    c. California Consumer Privacy Act (CCPA)
    d. Sarbanes-Oxley (SOX) Act

  37. Q37. What is not true of the Health Insurance Portability and Accountability Act (HIPAA) Title II?

    Select one:
    a. Both the HIPAA Privacy Rule and the Security Rule affect information technology operations within organizations.
    b. HIPAA is primarily concerned with protected health information (PHI).
    c. The HIPAA Security Rule regulates the use and disclosure of protected health information (PHI) by covered entities.
    d. The HIPAA Security Rule provides for the confidentiality, integrity, and availability of electronic protected health information (ePHI).

  38. Q38. What was created by the related industry to prevent credit card theft and fraud?

    Select one:
    a. Gramm-Leach-Bliley Act (GLBA)
    b. Health Insurance Portability and Accountability Act (HIPAA)
    c. Payment Card Industry Data Security Standard (PCI DSS)
    d. Sarbanes-Oxley (SOX) Act

  39. Q39. True or False? Auditing Standard No. 5 of the Sarbanes-Oxley Act asserts that auditors should use the same suitable, recognized control framework as the management of the company they are auditing.

    Select one:
    a. True
    b. False

  40. Q40. Which act grants the importance of sound information security practices, controls the interest of U.S. national security, and was amended to provide a framework for effective information security resources that support federal operations, data, and infrastructure?

    Select one:
    a. Sarbanes-Oxley (SOX) Act
    b. Federal Information Security Management Act (FISMA)
    c. Gramm-Leach-Bliley Act (GLBA)
    d. Red Flags Rule

Answers: ISI Quiz Questions

  1. b
  2. a
  3. a
  4. a
  5. d
  6. b
  7. a
  8. d
  9. a
  10. b
  11. a
  12. a
  13. b
  14. a
  15. b
  16. a
  17. a
  18. a
  19. c
  20. b
  21. d
  22. b
  23. a
  24. a
  25. a
  26. c
  27. b
  28. b
  29. c
  30. d
  31. d
  32. a
  33. d
  34. a
  35. a
  36. b
  37. c
  38. c
  39. a
  40. b

Leave a Comment

Your email address will not be published. Required fields are marked *