Which is the most accurate type of biometrics?
Which is the most accurate type of biometrics?A . DNA B. Voiceprint. C. Fingerprint. D. Facial recognition.View AnswerAnswer: B Explanation: Reference: https://www.bayometric.com/biometrics-face-finger-iris-palm-voice/
Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?
After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation: Statement 1 reads: “Please...
Which of the following is considered a client-side IT risk?
Which of the following is considered a client-side IT risk?A . Security policies focus solely on internal corporate obligations. B. An organization increases the number of applications on its server. C. An employee stores his personal information on his company laptop. D. IDs used to avoid the use of personal...
What kind of threat is the privacy technologist concerned about?
An organization is launching a new online subscription-based publication. As the service is not aimed at children, users are asked for their date of birth as part of the of the sign-up process. The privacy technologist suggests it may be more appropriate ask if an individual is over 18 rather...
What is the main function of the Amnesic Incognito Live System or TAILS device?
What is the main function of the Amnesic Incognito Live System or TAILS device?A . It allows the user to run a self-contained computer from a USB device. B. It accesses systems with a credential that leaves no discernable tracks. C. It encrypts data stored on any computer on a...
Which of the following CANNOT be effectively determined during a code audit?
Which of the following CANNOT be effectively determined during a code audit?A . Whether access control logic is recommended in all cases. B. Whether data is being incorrectly shared with a third-party. C. Whether consent is durably recorded in the case of a server crash. D. Whether the differential privacy...
Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?
SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which...
Which of the following would best improve an organization’ s system of limiting data use?
Which of the following would best improve an organization’ s system of limiting data use?A . Implementing digital rights management technology. B. Confirming implied consent for any secondary use of data. C. Applying audit trails to resources to monitor company personnel. D. Instituting a system of user authentication for company...
What would be an example of an organization transferring the risks associated with a data breach?
What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions. B. Encrypting sensitive personal data during collection and storage C. Purchasing insurance to cover the organization in case of a breach. D. Applying industry...
Why is first-party web tracking very difficult to prevent?
Why is first-party web tracking very difficult to prevent?A . The available tools to block tracking would break most sites’ functionality. B. Consumers enjoy the many benefits they receive from targeted advertising. C. Regulatory frameworks are not concerned with web tracking. D. Most browsers do not support automatic blocking.View AnswerAnswer:...