Filters
Question type

Study Flashcards

Which is NOT a way to validate a person's identity?


A) Swiping a smartcard into an electronic reader.
B) Using a program that creates random passwords.
C) Answering a question about "something you know".
D) Selecting a picture and tracing a unique pattern on it

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments. Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage. Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company's privacy risk assessment, noting that the secondary use of personal information was considered a high risk. By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn't wait to recommend his friend Ben who would be perfect for the job. Which data practice is Barney most likely focused on improving?


A) Deletion
B) Inventory.
C) Retention.
D) Sharing

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?


A) Configuring the environment to use shorter error messages.
B) Handing exceptions internally and not displaying errors to the user.
C) Creating default error pages or error messages which do not include variable data.
D) Logging the session name and necessary parameters once the error occurs to enable trouble shooting.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What tactic does pharming use to achieve its goal?


A) It modifies the user's Hosts file.
B) It encrypts files on a user's computer.
C) It creates a false display advertisement.
D) It generates a malicious instant message.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A vendor has been collecting data under an old contract, not aligned with the practices of the organization. Which is the preferred response?


A) Destroy the data
B) Update the contract to bring the vendor into alignment.
C) Continue the terms of the existing contract until it expires.
D) Terminate the contract and begin a vendor selection process.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What is a mistake organizations make when establishing privacy settings during the development of applications?


A) Providing a user with too many choices.
B) Failing to use "Do Not Track" technology.
C) Providing a user with too much third-party information.
D) Failing to get explicit consent from a user on the use of cookies.

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

Implementation of privacy controls for compliance with the requirements of the Children's Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?


A) A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain level, it flashes a message about new themes released that day.
B) An interactive toy copies a child's behavior through gestures and kid-friendly sounds. It runs on battery power and automatically connects to a base station at home to charge itself.
C) A math tutoring service commissioned an advertisement on a bulletin board inside a charter school. The service makes it simple to reach out to tutors through a QR-code shaped like a cartoon character.
D) A note-taking application converts hard copies of kids' class notes into audio books in seconds. It does so by using the processing power of idle server farms.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What Privacy by Design (PbD) element should include a de-identification or deletion plan?


A) Categorization.
B) Remediation.
C) Retention.
D) Security

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of these actions is NOT generally part of the responsibility of an IT or software engineer?


A) Providing feedback on privacy policies.
B) Implementing multi-factor authentication.
C) Certifying compliance with security and privacy law.
D) Building privacy controls into the organization's IT systems or software.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app. The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app. LBH's privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process. The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent. Regarding the app, which action is an example of a decisional interference violation?


A) The app asks income level to determine the treatment of care.
B) The app sells aggregated data to an advertising company without prior consent.
C) The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.
D) The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual's symptoms.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?


A) The ad being served to the user may not be relevant.
B) The user's sensitive personal information is used to display targeted ads.
C) The personal information used to target ads can be discerned by the server.
D) The user's information can be leaked to an advertiser through weak de-identification techniques.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is a vulnerability of a sensitive biometrics authentication system?


A) Theft of finely individualized personal data.
B) Slow recognition speeds.
C) False negatives.
D) False positives.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Which of the following is considered a records management best practice?


A) Archiving expired data records and files.
B) Storing decryption keys with their associated backup systems.
C) Implementing consistent handling practices across all record types.
D) Using classification to determine access rules and retention policy.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following is the best method to minimize tracking through the use of cookies?


A) Use 'private browsing' mode and delete checked files, clear cookies and cache once a day.
B) Install a commercially available third-party application on top of the browser that is already installed.
C) Install and use a web browser that is advertised as 'built specifically to safeguard user privacy'.
D) Manage settings in the browser to limit the use of cookies and remove them once the session completes.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?


A) The Personal Data Ordinance.
B) The EU Data Protection Directive.
C) The Code of Fair Information Practices.
D) The Organization for Economic Co-operation and Development (OECD) Privacy Principles.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere. Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as "My Cool Ride" for automobile-related products or "Zoomer" for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols. You have been asked to lead three important new projects at Ancillary: The first is the personal data management and security component of a multi-faceted initiative to unify the company's culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees. The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting. Finally, you are charged with developing privacy protections for a single web store housing all the company's product lines as well as products from affiliates. This new omnibus site will be known, aptly, as "Under the Sun." The Director of Marketing wants the site not only to sell Ancillary's products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach. If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?


A) Unseen web beacons that combine information on multiple users.
B) Latent keys that trigger malware when an advertisement is selected.
C) Personal information collected by cookies linked to the advertising network.
D) Sensitive information from Structured Query Language (SQL) commands that may be exposed.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

When analyzing user data, how is differential privacy applied?


A) By injecting noise into aggregated datasets.
B) By assessing differences between datasets.
C) By applying asymmetric encryption to datasets.
D) By removing personal identifiers from datasets.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere. Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as "My Cool Ride" for automobile-related products or "Zoomer" for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols. You have been asked to lead three important new projects at Ancillary: The first is the personal data management and security component of a multi-faceted initiative to unify the company's culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees. The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting. Finally, you are charged with developing privacy protections for a single web store housing all the company's product lines as well as products from affiliates. This new omnibus site will be known, aptly, as "Under the Sun." The Director of Marketing wants the site not only to sell Ancillary's products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach. Which should be used to allow the home sales force to accept payments using smartphones?


A) Field transfer protocol.
B) Cross-current translation.
C) Near-field communication
D) Radio Frequency Identification

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?


A) Limited-retention, de-identified logs including only metadata.
B) Limited-retention, de-identified logs including the links clicked in messages as well as metadata.
C) Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.
D) Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What is the goal of privacy enhancing technologies (PETS) like multiparty computation and differential privacy?


A) To facilitate audits of third party vendors.
B) To protect sensitive data while maintaining its utility.
C) To standardize privacy activities across organizational groups.
D) To protect the security perimeter and the data items themselves.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 125

Related Exams

Show Answer