How should the sharing of information within an organization be documented?
How should the sharing of information within an organization be documented?A . With a binding contract.B . With a data fow diagram.C . With a disclosure statement.D . With a memorandum of agreement.View AnswerAnswer: B
Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house...
Which of the following would best improve an organization' s system of limiting data use?
Which of the following would best improve an organization' s system of limiting data use?A . Implementing digital rights management technology.B . Confirming implied consent for any secondary use of data.C . Applying audit trails to resources to monitor company personnel.D . Instituting a system of user authentication for company...
Which is the most accurate type of biometrics?
Which is the most accurate type of biometrics?A . DNAB . Voiceprint.C . Fingerprint.D . Facial recognition.View AnswerAnswer: A
Which of the following most embodies the principle of Data Protection by Default?
Which of the following most embodies the principle of Data Protection by Default?A . A messaging app for high school students that uses HTTPS to communicate with the server.B . An electronic teddy bear with built-in voice recognition that only responds to its owner's voice.C . An internet forum for...
If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?
SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen...
Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?
Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?A . Biometric data.B . Picture passwords.C . Personal identification number.D . Radio frequency identification.View AnswerAnswer: A
What has been identified as a significant privacy concern with chatbots?
What has been identified as a significant privacy concern with chatbots?A . Most chatbot providers do not agree to code auditsB . Chatbots can easily verify the identity of the contact.C . Users' conversations with chatbots are not encrypted in transit.D . Chatbot technology providers may be able to read...
What is the potential advantage of homomorphic encryption?
What is the potential advantage of homomorphic encryption?A . Encrypted information can be analyzed without decrypting it first.B . Ciphertext size decreases as the security level increases.C . It allows greater security and faster processing times.D . It makes data impenetrable to attacks.View AnswerAnswer: A
A sensitive biometrics authentication system is particularly susceptible to?
A sensitive biometrics authentication system is particularly susceptible to?A . False positives.B . False negatives.C . Slow recognition speeds.D . Theft of finely individualized personal data.View AnswerAnswer: D