Which data practice is Barney most likely focused on improving?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...

September 22, 2021 No Comments READ MORE +

Which of the following is a vulnerability of a sensitive biometrics authentication system?

Which of the following is a vulnerability of a sensitive biometrics authentication system?A . False positives.B . False negatives.C . Slow recognition speeds.D . Theft of finely individualized personal data.View AnswerAnswer: C

September 22, 2021 No Comments READ MORE +

Based on the current features of the fitness watch, what would you recommend be implemented into each device in order to most effectively ensure privacy?

SCENARIO Please use the following to answer the next question: Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a...

September 21, 2021 No Comments READ MORE +

Things (loT)?

Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?A . A group of hackers infiltrate a power grid and cause a major blackout.B . An insurance company raises a person’s rates based on driving habits gathered from a connected car.C ....

September 20, 2021 No Comments READ MORE +

What control would apply?

A user who owns a resource wants to give other individuals access to the resource . What control would apply?A . Mandatory access control.B . Role-based access controls.C . Discretionary access control.D . Context of authority controls.View AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/bs-latn-ba/azure/role-based-access-control/overview

September 20, 2021 No Comments READ MORE +

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?A . Individual participation.B . Purpose specification.C . Collection limitation.D . Accountability.View AnswerAnswer: C Explanation: Reference: http://oecdprivacy.org

September 19, 2021 No Comments READ MORE +

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

What Privacy by Design (PbD) element should include a de-identification or deletion plan?A . Categorization.B . Remediation.C . Retention.D . SecurityView AnswerAnswer: C

September 19, 2021 No Comments READ MORE +

Which of the following is an example of drone “swarming”?

Which of the following is an example of drone “swarming”?A . A drone filming a cyclist from above as he rides.B . A drone flying over a building site to gather data.C . Drones delivering retailers’ packages to private homes.D . Drones communicating with each other to perform a search...

September 19, 2021 No Comments READ MORE +

Regarding the app, which action is an example of a decisional interference violation?

SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based...

September 19, 2021 No Comments READ MORE +