What would be an example of an organization transferring the risks associated with a data breach?

What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions. B. Encrypting sensitive personal data during collection and storage C. Purchasing insurance to cover the organization in case of a breach. D. Applying industry...

June 23, 2023 No Comments READ MORE +

What is a main beneft of data aggregation?

What is a main beneft of data aggregation?A . It is a good way to perform analysis without needing a statistician. B. It applies two or more layers of protection to a single data record. C. It allows one to draw valid conclusions from small data samples. D. It is...

June 22, 2023 No Comments READ MORE +

A key principle of an effective privacy policy is that it should be?

A key principle of an effective privacy policy is that it should be?A . Written in enough detail to cover the majority of likely scenarios. B. Made general enough to maximize fexibility in its application. C. Presented with external parties as the intended audience. D. Designed primarily by the organization's...

June 22, 2023 No Comments READ MORE +

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifcations and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn't wait to recommend his friend Ben who would be perfect for the job. Ted's implementation is most likely a response to what incident?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's...

June 21, 2023 No Comments READ MORE +

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you fnd yourself considering an intriguing question: Can these people be sure that I am who I say I am?

SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores fnancial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain...

June 21, 2023 No Comments READ MORE +

Which is NOT a way to validate a person's identity?

Which is NOT a way to validate a person's identity?A . Swiping a smartcard into an electronic reader. B. Using a program that creates random passwords. C. Answering a question about "something you knowג. D. Selecting a picture and tracing a unique pattern on itView AnswerAnswer: B

June 21, 2023 No Comments READ MORE +

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?A . Verifying the accuracy of the data by contacting users. B. Validating the company's data collection procedures. C. Introducing erroneous data to see if its detected. D. Tracking changes to data through auditing.View...

June 21, 2023 No Comments READ MORE +

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?A . The implied consent model provides the user with more detailed data collection information. B. To secure explicit consent, a user's website browsing would be signifcantly disrupted. C....

June 21, 2023 No Comments READ MORE +

Which activity would best support the principle of data quality?

Which activity would best support the principle of data quality?A . Providing notice to the data subject regarding any change in the purpose for collecting such data. B. Ensuring that the number of teams processing personal information is limited. C. Delivering information in a format that the data subject understands....

June 20, 2023 No Comments READ MORE +

How does k-anonymity help to protect privacy in micro data sets?

How does k-anonymity help to protect privacy in micro data sets?A . By ensuring that every record in a set is part of a group of "k" records having similar identifying information. B. By switching values between records in order to preserve most statistics while still maintaining privacy. C. By...

June 20, 2023 No Comments READ MORE +