9. Final Quiz
Welcome to the final quiz, the following eleven questions cover all 8 sessions.
Quiz Summary
0 of 11 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 11 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Dear participant,
Congratulations for completing the training on data privacy!
During this course, you learned about different aspects of data privacy and data security. You are now aware of the main aspects of this field and can consult with colleagues in your team, organisation and company on how to include these lessons in your project development and every day work.
We thank you for your contribution and hope our course provided you with helpful insights for your future work!
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- Answered
- Review
-
Question 1 of 11
1. Question
1. From a data protection perspective, what is the definition of the following data: “PhD title, gender, Zip Code, shirt size”
CorrectIncorrect -
Question 2 of 11
2. Question
2. Which of the following data categories are subject to data protection regulation?
CorrectIncorrect -
Question 3 of 11
3. Question
3. Who can poor data handling pose risks to?
CorrectIncorrect -
Question 4 of 11
4. Question
4. As we learned, potential risks connected to data include the possibility of losing data, losing privacy, losing something valuable and/or reputational damage. Is this the extent of the risks connected to data?
CorrectIncorrect -
Question 5 of 11
5. Question
5. A Privacy Risk Assessment ideally is done once the product or digital solution is about to be launched.
CorrectIncorrect -
Question 6 of 11
6. Question
6. Responsible Data Management is about shifting the focus from openness to privacy.
CorrectIncorrect -
Question 7 of 11
7. Question
7. When it comes to de-identified data the most dangerous risk is that somebody can be identified in a data set.
CorrectIncorrect -
Question 8 of 11
8. Question
8. Once you get consent from a user you can use his or her data personal data in the way you want.
CorrectIncorrect -
Question 9 of 11
9. Question
9. Digital Security is about making the technology you are using secure.
CorrectIncorrect -
Question 10 of 11
10. Question
10. A strong password is one which contains one capital letter and a number.
CorrectIncorrect -
Question 11 of 11
11. Question
11. Human-centered design means designing solutions for humans.
CorrectIncorrect