Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?

Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?A . A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain...

September 9, 2021 No Comments READ MORE +

Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?

Users of a web-based email service have their accounts breached through compromised login credentials . Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?A . Financial loss and blackmail.B . Financial loss and solicitation.C . Identity theft and embarrassment.D . Identity theft and the leaking...

September 9, 2021 No Comments READ MORE +

Which of the following is considered a client-side IT risk?

Which of the following is considered a client-side IT risk?A . Security policies focus solely on internal corporate obligations.B . An organization increases the number of applications on its server.C . An employee stores his personal information on his company laptop.D . IDs used to avoid the use of personal...

April 21, 2020 No Comments READ MORE +

A valid argument against data minimization is that it?

A valid argument against data minimization is that it?A . Can limit business opportunities.B . Decreases the speed of data transfers.C . Can have an adverse effect on data quality.D . Increases the chance that someone can be identified from data.View AnswerAnswer: A

April 20, 2020 No Comments READ MORE +

What is a mistake organizations make when establishing privacy settings during the development of applications?

What is a mistake organizations make when establishing privacy settings during the development of applications?A . Providing a user with too many choices.B . Failing to use "Do Not Track” technology.C . Providing a user with too much third-party information.D . Failing to get explicit consent from a user on...

April 20, 2020 No Comments READ MORE +

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...

April 19, 2020 No Comments READ MORE +

What must be done to destroy data stored on "write once read many" (WORM) media?

What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C

April 19, 2020 No Comments READ MORE +

What is the most important requirement to fulfill when transferring data out of an organization?

What is the most important requirement to fulfill when transferring data out of an organization?A . Ensuring the organization sending the data controls how the data is tagged by the receiver.B . Ensuring the organization receiving the data performs a privacy impact assessment.C . Ensuring the commitments made to the...

April 19, 2020 No Comments READ MORE +

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance.B . The EU Data Protection Directive.C . The Code of Fair Information Practices.D . The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D...

April 18, 2020 No Comments READ MORE +

What is the distinguishing feature of asymmetric encryption?

What is the distinguishing feature of asymmetric encryption?A . It has a stronger key for encryption than for decryption.B . It employs layered encryption using dissimilar methods.C . It uses distinct keys for encryption and decryption.D . It is designed to cross operating systems.View AnswerAnswer: C Explanation: Reference: https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions­and-properties

April 18, 2020 No Comments READ MORE +