Which is the preferred response?

A vendor has been collecting data under an old contract, not aligned with the practices of the organization. Which is the preferred response?A . Destroy the dataB . Update the contract to bring the vendor into alignment.C . Continue the terms of the existing contract until it expires.D . Terminate...

September 14, 2021 No Comments READ MORE +

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...

September 14, 2021 No Comments READ MORE +

Which is NOT a way to validate a person's identity?

Which is NOT a way to validate a person's identity?A . Swiping a smartcard into an electronic reader.B . Using a program that creates random passwords.C . Answering a question about "something you know”.D . Selecting a picture and tracing a unique pattern on itView AnswerAnswer: B

September 14, 2021 No Comments READ MORE +

What is the main function of the Amnesic Incognito Live System or TAILS device?

What is the main function of the Amnesic Incognito Live System or TAILS device?A . It allows the user to run a self-contained computer from a USB device.B . It accesses systems with a credential that leaves no discernable tracks.C . It encrypts data stored on any computer on a...

September 13, 2021 No Comments READ MORE +

Which of the following would best explain why the retailer’s consumer data was still exfiltrated?

Between November 30th and December 2nd, 2013, cybercriminals successfully infected the credit card payment systems and bypassed security controls of a United States-based retailer with malware that exfiltrated 40 million credit card numbers. Six months prior, the retailer had malware detection software installed to prevent against such an attack. Which...

September 13, 2021 No Comments READ MORE +

What was the first privacy framework to be developed?

What was the first privacy framework to be developed?A . OECD Privacy Principles.B . Generally Accepted Privacy Principles.C . Code of Fair Information Practice Principles (FIPPs).D . The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.View AnswerAnswer: A Explanation: Reference: http://oecdprivacy.org

September 13, 2021 No Comments READ MORE +

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?A . By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.B . By increasing the size of neural networks and running massive amounts of...

September 11, 2021 No Comments READ MORE +

If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?

SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen...

September 11, 2021 No Comments READ MORE +

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?A . Develop a technical privacy framework that integrates with the development lifecycle.B . Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.C . Identify...

September 11, 2021 No Comments READ MORE +