What must be done to destroy data stored on "write once read many" (WORM) media?

What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C

May 17, 2025 No Comments READ MORE +

Which should be used to allow the home sales force to accept payments using smartphones?

SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen...

May 17, 2025 No Comments READ MORE +

Which of the following is NOT a workplace surveillance best practice?

Which of the following is NOT a workplace surveillance best practice?A . Check local privacy laws before putting surveillance in place.B . Ensure surveillance is discreet so employees do not alter their behavior.C . Once surveillance data has been gathered, limit exposure of the content.D . Ensure the minimal amount...

May 17, 2025 No Comments READ MORE +

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?A . Individual participation.B . Purpose specification.C . Collection limitation.D . Accountability.View AnswerAnswer: A

May 15, 2025 No Comments READ MORE +

Under the Family Educational Rights and Privacy Act (FERPA), releasing personally identifiable information from a student's educational record requires written permission from the parent or eligible student in order for information to be?

Under the Family Educational Rights and Privacy Act (FERPA), releasing personally identifiable information from a student's educational record requires written permission from the parent or eligible student in order for information to be?A . Released to a prospective employer.B . Released to schools to which a student is transferring.C ....

May 15, 2025 No Comments READ MORE +

What is the best way to protect privacy on a geographic information system?

What is the best way to protect privacy on a geographic information system?A . Limiting the data provided to the system.B . Using a wireless encryption protocol.C . Scrambling location information.D . Using a firewall.View AnswerAnswer: A

May 14, 2025 No Comments READ MORE +

Which is NOT a way to validate a person's identity?

Which is NOT a way to validate a person's identity?A . Swiping a smartcard into an electronic reader.B . Using a program that creates random passwords.C . Answering a question about "something you know”.D . Selecting a picture and tracing a unique pattern on itView AnswerAnswer: B

May 14, 2025 No Comments READ MORE +

What is the term for information provided to a social network by a member?

What is the term for information provided to a social network by a member?A . Profile data.B . Declared data.C . Personal choice data.D . Identifier information.View AnswerAnswer: B

May 13, 2025 No Comments READ MORE +

A key principle of an effective privacy policy is that it should be?

A key principle of an effective privacy policy is that it should be?A . Written in enough detail to cover the majority of likely scenarios.B . Made general enough to maximize flexibility in its application.C . Presented with external parties as the intended audience.D . Designed primarily by the organization's...

May 11, 2025 No Comments READ MORE +

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. `The old...

May 6, 2025 No Comments READ MORE +