What would be an example of an organization transferring the risks associated with a data breach?

What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions.B . Encrypting sensitive personal data during collection and storageC . Purchasing insurance to cover the organization in case of a breach.D . Applying industry...

April 13, 2020 No Comments READ MORE +

Ted's implementation is most likely a response to what incident?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...

April 12, 2020 No Comments READ MORE +

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?A . The implied consent model provides the user with more detailed data collection information.B . To secure explicit consent, a user's website browsing would be significantly disrupted.C ....

April 12, 2020 1 Comment READ MORE +

Which of the following suggests the greatest degree of transparency?

Which of the following suggests the greatest degree of transparency?A . A privacy disclosure statement clearly articulates general purposes for collectionB . The data subject has multiple opportunities to opt-out after collection has occurred.C . A privacy notice accommodates broadly defined future collections for new products.D . After reading the...

April 12, 2020 No Comments READ MORE +

Which data practice is Barney most likely focused on improving?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...

April 11, 2020 No Comments READ MORE +

Which is NOT a suitable action to apply to data when the retention period ends?

Which is NOT a suitable action to apply to data when the retention period ends?A . Aggregation.B . De-identification.C . Deletion.D . Retagging.View AnswerAnswer: C

April 11, 2020 No Comments READ MORE +

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?

SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...

April 10, 2020 No Comments READ MORE +

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?

SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...

April 10, 2020 No Comments READ MORE +

What can be used to determine the type of data in storage without exposing its contents?

What can be used to determine the type of data in storage without exposing its contents?A . Collection records.B . Data mapping.C . Server logs.D . Metadata.View AnswerAnswer: D Explanation: Reference: https://cloud.google.com/storage/docs/gsutil/addlhelp/WorkingWithObjectMetadata

April 10, 2020 No Comments READ MORE +

How does k-anonymity help to protect privacy in micro data sets?

How does k-anonymity help to protect privacy in micro data sets?A . By ensuring that every record in a set is part of a group of "k" records having similar identifying information.B . By switching values between records in order to preserve most statistics while still maintaining privacy.C . By...

April 9, 2020 No Comments READ MORE +