What is a main benefit of data aggregation?
What is a main benefit of data aggregation?A . It is a good way to perform analysis without needing a statistician.B . It applies two or more layers of protection to a single data record.C . It allows one to draw valid conclusions from small data samples.D . It is...
What would be an example of an organization transferring the risks associated with a data breach?
What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions.B . Encrypting sensitive personal data during collection and storageC . Purchasing insurance to cover the organization in case of a breach.D . Applying industry...
Which is likely to reduce the types of access controls needed within an organization?
Which is likely to reduce the types of access controls needed within an organization?A . Decentralization of data.B . Regular data inventories.C . Standardization of technology.D . Increased number of remote employees.View AnswerAnswer: C
Which of the following statements best describes the relationship between privacy and security?
Which of the following statements best describes the relationship between privacy and security?A . Security systems can be used to enforce compliance with privacy policies.B . Privacy and security are independent; organizations must decide which should by emphasized.C . Privacy restricts access to personal information; security regulates how information should...
Which data practice is Barney most likely focused on improving?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...
Which of the following is a vulnerability of a sensitive biometrics authentication system?
Which of the following is a vulnerability of a sensitive biometrics authentication system?A . False positives.B . False negatives.C . Slow recognition speeds.D . Theft of finely individualized personal data.View AnswerAnswer: C
Based on the current features of the fitness watch, what would you recommend be implemented into each device in order to most effectively ensure privacy?
SCENARIO Please use the following to answer the next question: Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a...
Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago?
SCENARIO Please use the following to answer the next question: Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training...
Things (loT)?
Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?A . A group of hackers infiltrate a power grid and cause a major blackout.B . An insurance company raises a person’s rates based on driving habits gathered from a connected car.C ....
What control would apply?
A user who owns a resource wants to give other individuals access to the resource . What control would apply?A . Mandatory access control.B . Role-based access controls.C . Discretionary access control.D . Context of authority controls.View AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/bs-latn-ba/azure/role-based-access-control/overview