A) Swiping a smartcard into an electronic reader.
B) Using a program that creates random passwords.
C) Answering a question about "something you know".
D) Selecting a picture and tracing a unique pattern on it
Correct Answer
verified
Multiple Choice
A) Deletion
B) Inventory.
C) Retention.
D) Sharing
Correct Answer
verified
Multiple Choice
A) Configuring the environment to use shorter error messages.
B) Handing exceptions internally and not displaying errors to the user.
C) Creating default error pages or error messages which do not include variable data.
D) Logging the session name and necessary parameters once the error occurs to enable trouble shooting.
Correct Answer
verified
Multiple Choice
A) It modifies the user's Hosts file.
B) It encrypts files on a user's computer.
C) It creates a false display advertisement.
D) It generates a malicious instant message.
Correct Answer
verified
Multiple Choice
A) Destroy the data
B) Update the contract to bring the vendor into alignment.
C) Continue the terms of the existing contract until it expires.
D) Terminate the contract and begin a vendor selection process.
Correct Answer
verified
Multiple Choice
A) Providing a user with too many choices.
B) Failing to use "Do Not Track" technology.
C) Providing a user with too much third-party information.
D) Failing to get explicit consent from a user on the use of cookies.
Correct Answer
verified
Multiple Choice
A) A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain level, it flashes a message about new themes released that day.
B) An interactive toy copies a child's behavior through gestures and kid-friendly sounds. It runs on battery power and automatically connects to a base station at home to charge itself.
C) A math tutoring service commissioned an advertisement on a bulletin board inside a charter school. The service makes it simple to reach out to tutors through a QR-code shaped like a cartoon character.
D) A note-taking application converts hard copies of kids' class notes into audio books in seconds. It does so by using the processing power of idle server farms.
Correct Answer
verified
Multiple Choice
A) Categorization.
B) Remediation.
C) Retention.
D) Security
Correct Answer
verified
Multiple Choice
A) Providing feedback on privacy policies.
B) Implementing multi-factor authentication.
C) Certifying compliance with security and privacy law.
D) Building privacy controls into the organization's IT systems or software.
Correct Answer
verified
Multiple Choice
A) The app asks income level to determine the treatment of care.
B) The app sells aggregated data to an advertising company without prior consent.
C) The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.
D) The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual's symptoms.
Correct Answer
verified
Multiple Choice
A) The ad being served to the user may not be relevant.
B) The user's sensitive personal information is used to display targeted ads.
C) The personal information used to target ads can be discerned by the server.
D) The user's information can be leaked to an advertiser through weak de-identification techniques.
Correct Answer
verified
Multiple Choice
A) Theft of finely individualized personal data.
B) Slow recognition speeds.
C) False negatives.
D) False positives.
Correct Answer
verified
Multiple Choice
A) Archiving expired data records and files.
B) Storing decryption keys with their associated backup systems.
C) Implementing consistent handling practices across all record types.
D) Using classification to determine access rules and retention policy.
Correct Answer
verified
Multiple Choice
A) Use 'private browsing' mode and delete checked files, clear cookies and cache once a day.
B) Install a commercially available third-party application on top of the browser that is already installed.
C) Install and use a web browser that is advertised as 'built specifically to safeguard user privacy'.
D) Manage settings in the browser to limit the use of cookies and remove them once the session completes.
Correct Answer
verified
Multiple Choice
A) The Personal Data Ordinance.
B) The EU Data Protection Directive.
C) The Code of Fair Information Practices.
D) The Organization for Economic Co-operation and Development (OECD) Privacy Principles.
Correct Answer
verified
Multiple Choice
A) Unseen web beacons that combine information on multiple users.
B) Latent keys that trigger malware when an advertisement is selected.
C) Personal information collected by cookies linked to the advertising network.
D) Sensitive information from Structured Query Language (SQL) commands that may be exposed.
Correct Answer
verified
Multiple Choice
A) By injecting noise into aggregated datasets.
B) By assessing differences between datasets.
C) By applying asymmetric encryption to datasets.
D) By removing personal identifiers from datasets.
Correct Answer
verified
Multiple Choice
A) Field transfer protocol.
B) Cross-current translation.
C) Near-field communication
D) Radio Frequency Identification
Correct Answer
verified
Multiple Choice
A) Limited-retention, de-identified logs including only metadata.
B) Limited-retention, de-identified logs including the links clicked in messages as well as metadata.
C) Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.
D) Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.
Correct Answer
verified
Multiple Choice
A) To facilitate audits of third party vendors.
B) To protect sensitive data while maintaining its utility.
C) To standardize privacy activities across organizational groups.
D) To protect the security perimeter and the data items themselves.
Correct Answer
verified
Showing 61 - 80 of 125
Related Exams