What is the distinguishing feature of asymmetric encryption?

What is the distinguishing feature of asymmetric encryption?A . It has a stronger key for encryption than for decryption.B . It employs layered encryption using dissimilar methods.C . It uses distinct keys for encryption and decryption.D . It is designed to cross operating systems.View AnswerAnswer: C

March 21, 2025 No Comments READ MORE +

What has been found to undermine the public key infrastructure system?

What has been found to undermine the public key infrastructure system?A . Man-in-the-middle attacks.B . Inability to track abandoned keys.C . Disreputable certificate authorities.D . Browsers missing a copy of the certificate authority's public key.View AnswerAnswer: C

March 20, 2025 No Comments READ MORE +

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...

March 19, 2025 No Comments READ MORE +

Why is first-party web tracking very difficult to prevent?

Why is first-party web tracking very difficult to prevent?A . The available tools to block tracking would break most sites’ functionality.B . Consumers enjoy the many benefits they receive from targeted advertising.C . Regulatory frameworks are not concerned with web tracking.D . Most browsers do not support automatic blocking.View AnswerAnswer:...

March 18, 2025 No Comments READ MORE +

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?A . Most web browsers incorporate the DNT feature.B . The financial penalties for violating DNT guidelines are too high.C . There is a lack of consensus about what the DNT header should mean.D...

March 17, 2025 No Comments READ MORE +

What is an example of a just-in-time notice?

What is an example of a just-in-time notice?A . A warning that a website may be unsafe.B . A full organizational privacy notice publicly available on a websiteC . A credit card company calling a user to verify a purchase before it is authorizedD . Privacy information given to a...

March 15, 2025 No Comments READ MORE +

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance.B . The EU Data Protection Directive.C . The Code of Fair Information Practices.D . The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D

March 13, 2025 No Comments READ MORE +

All of the following can be indications of a ransomware attack EXCEPT?

All of the following can be indications of a ransomware attack EXCEPT?A . The inability to access certain files.B . An increased amount of spam email in an individual's inbox.C . An increase in activity of the CPU of a computer for no apparent reason.D . The detection of suspicious...

March 11, 2025 No Comments READ MORE +

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?A . The Open ID Federation.B . PCI Data Security Standards CouncilC . International Organization for Standardization.D . Personal Information Protection and Electronic Documents Act.View AnswerAnswer: A

March 9, 2025 No Comments READ MORE +

A valid argument against data minimization is that it?

A valid argument against data minimization is that it?A . Can limit business opportunities.B . Decreases the speed of data transfers.C . Can have an adverse effect on data quality.D . Increases the chance that someone can be identified from data.View AnswerAnswer: A

March 4, 2025 No Comments READ MORE +