What is true of providers of wireless technology?
What is true of providers of wireless technology?A . They have the legal right in most countries to control and use any data on their systems.B . They can see all unencrypted data that crosses the system.C . They are typically exempt from data security regulations.D . They routinely backup...
What is an Access Control List?
What is an Access Control List?A . A list of steps necessary for an individual to access a resource.B . A list that indicates the type of permission granted to each individual.C . A list showing the resources that an individual has permission to access.D . A list of individuals...
What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?
What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?A . Most web browsers incorporate the DNT feature.B . The financial penalties for violating DNT guidelines are too high.C . There is a lack of consensus about what the DNT header should mean.D...
What should Harry advise for maintaining company security in this situation?
SCENARIO Tom looked forward to starting his new position with a U.S ―based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company)....
Which is the preferred response?
A vendor has been collecting data under an old contract, not aligned with the practices of the organization. Which is the preferred response?A . Destroy the dataB . Update the contract to bring the vendor into alignment.C . Continue the terms of the existing contract until it expires.D . Terminate...
Which of the following should Kyle recommend to Jill as the best source of support for her initiative?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...
Which is NOT a way to validate a person's identity?
Which is NOT a way to validate a person's identity?A . Swiping a smartcard into an electronic reader.B . Using a program that creates random passwords.C . Answering a question about "something you know”.D . Selecting a picture and tracing a unique pattern on itView AnswerAnswer: B
Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago?
SCENARIO Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive...
What is the main function of the Amnesic Incognito Live System or TAILS device?
What is the main function of the Amnesic Incognito Live System or TAILS device?A . It allows the user to run a self-contained computer from a USB device.B . It accesses systems with a credential that leaves no discernable tracks.C . It encrypts data stored on any computer on a...
Which of the following would best explain why the retailer’s consumer data was still exfiltrated?
Between November 30th and December 2nd, 2013, cybercriminals successfully infected the credit card payment systems and bypassed security controls of a United States-based retailer with malware that exfiltrated 40 million credit card numbers. Six months prior, the retailer had malware detection software installed to prevent against such an attack. Which...