A) Ensuring the organization sending the data controls how the data is tagged by the receiver.
B) Ensuring the organization receiving the data performs a privacy impact assessment.
C) Ensuring the commitments made to the data owner are followed.
D) Extending the data retention schedule as needed.
Correct Answer
verified
Multiple Choice
A) Providing notice to the data subject regarding any change in the purpose for collecting such data.
B) Ensuring that the number of teams processing personal information is limited.
C) Delivering information in a format that the data subject understands.
D) Ensuring that information remains accurate.
Correct Answer
verified
Multiple Choice
A) Auditing the code which deletes user accounts.
B) Building a standardized and documented retention program for user data deletion.
C) Monitoring each data store for presence of data associated with the deleted user account.
D) Training engineering teams on the importance of deleting user accounts their associated data from all data stores when requested.
Correct Answer
verified
Multiple Choice
A) A hidden network.
B) A reluctant network.
C) A user verified network.
D) A wireless mesh network.
Correct Answer
verified
Multiple Choice
A) A drone filming a cyclist from above as he rides.
B) A drone flying over a building site to gather data.
C) Drones delivering retailers' packages to private homes.
D) Drones communicating with each other to perform a search and rescue.
Correct Answer
verified
Multiple Choice
A) Peer-to-peer architecture.
B) Client-server architecture.
C) Plug-in-based architecture.
D) Service-oriented architecture.
Correct Answer
verified
Multiple Choice
A) Server driven controls.
B) Cloud computing
C) Data on demand
D) MAC filtering
Correct Answer
verified
Multiple Choice
A) It allows the user to run a self-contained computer from a USB device.
B) It accesses systems with a credential that leaves no discernable tracks.
C) It encrypts data stored on any computer on a network.
D) It causes a system to suspend its security protocols.
Correct Answer
verified
Multiple Choice
A) Man-in-the-middle attacks.
B) Inability to track abandoned keys.
C) Disreputable certificate authorities.
D) Browsers missing a copy of the certificate authority's public key.
Correct Answer
verified
Multiple Choice
A) Aggregation.
B) De-identification.
C) Deletion.
D) Retagging.
Correct Answer
verified
Multiple Choice
A) Pseudonymous data.
B) Anonymous data.
C) Aggregated data.
D) Imprecise data.
Correct Answer
verified
Multiple Choice
A) The implied consent model provides the user with more detailed data collection information.
B) To secure explicit consent, a user's website browsing would be significantly disrupted.
C) An explicit consent model is more expensive to implement.
D) Regulators prefer the implied consent model.
Correct Answer
verified
Multiple Choice
A) Remnant.
B) Behavioral.
C) Contextual.
D) Demographic.
Correct Answer
verified
Multiple Choice
A) Encryption keys were previously unavailable to the organization's cloud storage host.
B) Signatureless advanced malware was detected at multiple points on the organization's networks.
C) Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network.
D) Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor.
Correct Answer
verified
Multiple Choice
A) Risk transfer.
B) Risk mitigation.
C) Risk avoidance.
D) Risk acceptance.
Correct Answer
verified
Multiple Choice
A) A privacy disclosure statement clearly articulates general purposes for collection
B) The data subject has multiple opportunities to opt-out after collection has occurred.
C) A privacy notice accommodates broadly defined future collections for new products.
D) After reading the privacy notice, a data subject confidently infers how her information will be used.
Correct Answer
verified
Multiple Choice
A) Copies of the consent forms from each data subject.
B) Time limits for erasure of different categories of data.
C) Contact details of the processor and Data Protection Offer (DPO) .
D) Descriptions of the processing activities and relevant data subjects.
Correct Answer
verified
Multiple Choice
A) Limiting the data provided to the system.
B) Using a wireless encryption protocol.
C) Scrambling location information.
D) Using a firewall.
Correct Answer
verified
Multiple Choice
A) De-linking of data into client-specific packets.
B) Cloud-based applications.
C) Server-side controls.
D) Data pruning
Correct Answer
verified
Multiple Choice
A) Hiding wireless service set identifiers (SSID) .
B) Retaining the password assigned by the network.
C) Employing Wired Equivalent Privacy (WEP) encryption.
D) Using tokens sent through HTTP sites to verify user identity.
Correct Answer
verified
Showing 1 - 20 of 125
Related Exams