Which of the following is considered a client-side IT risk?
Which of the following is considered a client-side IT risk?A . Security policies focus solely on internal corporate obligations.B . An organization increases the number of applications on its server.C . An employee stores his personal information on his company laptop.D . IDs used to avoid the use of personal...
A valid argument against data minimization is that it?
A valid argument against data minimization is that it?A . Can limit business opportunities.B . Decreases the speed of data transfers.C . Can have an adverse effect on data quality.D . Increases the chance that someone can be identified from data.View AnswerAnswer: A
What is a mistake organizations make when establishing privacy settings during the development of applications?
What is a mistake organizations make when establishing privacy settings during the development of applications?A . Providing a user with too many choices.B . Failing to use "Do Not Track” technology.C . Providing a user with too much third-party information.D . Failing to get explicit consent from a user on...
Which of the following should Kyle recommend to Jill as the best source of support for her initiative?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...
What must be done to destroy data stored on "write once read many" (WORM) media?
What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C
What is the most important requirement to fulfill when transferring data out of an organization?
What is the most important requirement to fulfill when transferring data out of an organization?A . Ensuring the organization sending the data controls how the data is tagged by the receiver.B . Ensuring the organization receiving the data performs a privacy impact assessment.C . Ensuring the commitments made to the...
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance.B . The EU Data Protection Directive.C . The Code of Fair Information Practices.D . The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D...
What is the distinguishing feature of asymmetric encryption?
What is the distinguishing feature of asymmetric encryption?A . It has a stronger key for encryption than for decryption.B . It employs layered encryption using dissimilar methods.C . It uses distinct keys for encryption and decryption.D . It is designed to cross operating systems.View AnswerAnswer: C Explanation: Reference: https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functionsand-properties
Which two actions should you perform?
You are the Microsoft 365 administrator for a company. Users in the IT department must receive new Office 365 preview features before the features are deployed to other users in the company. You need to ensure only the users in the IT department receive preview features. Which two actions should...
What is the main function of a breach response center?
What is the main function of a breach response center?A . Detecting internal security attacks.B . Addressing privacy incidents.C . Providing training to internal constituencies.D . Interfacing with privacy regulators and governmental bodies.View AnswerAnswer: B