What would be an example of an organization transferring the risks associated with a data breach?
What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions.B . Encrypting sensitive personal data during collection and storageC . Purchasing insurance to cover the organization in case of a breach.D . Applying industry...
What is the most important requirement to fulfill when transferring data out of an organization?
What is the most important requirement to fulfill when transferring data out of an organization?A . Ensuring the organization sending the data controls how the data is tagged by the receiver.B . Ensuring the organization receiving the data performs a privacy impact assessment.C . Ensuring the commitments made to the...
How should the sharing of information within an organization be documented?
How should the sharing of information within an organization be documented?A . With a binding contract.B . With a data fow diagram.C . With a disclosure statement.D . With a memorandum of agreement.View AnswerAnswer: B
Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house...
Which of the following would best improve an organization' s system of limiting data use?
Which of the following would best improve an organization' s system of limiting data use?A . Implementing digital rights management technology.B . Confirming implied consent for any secondary use of data.C . Applying audit trails to resources to monitor company personnel.D . Instituting a system of user authentication for company...
Which is the most accurate type of biometrics?
Which is the most accurate type of biometrics?A . DNAB . Voiceprint.C . Fingerprint.D . Facial recognition.View AnswerAnswer: A
Which of the following most embodies the principle of Data Protection by Default?
Which of the following most embodies the principle of Data Protection by Default?A . A messaging app for high school students that uses HTTPS to communicate with the server.B . An electronic teddy bear with built-in voice recognition that only responds to its owner's voice.C . An internet forum for...
If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?
SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen...
Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?
Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?A . Biometric data.B . Picture passwords.C . Personal identification number.D . Radio frequency identification.View AnswerAnswer: A
What has been identified as a significant privacy concern with chatbots?
What has been identified as a significant privacy concern with chatbots?A . Most chatbot providers do not agree to code auditsB . Chatbots can easily verify the identity of the contact.C . Users' conversations with chatbots are not encrypted in transit.D . Chatbot technology providers may be able to read...