What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?
SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the...
What term describes two re-identifiable data sets that both come from the same unidentified individual?
What term describes two re-identifiable data sets that both come from the same unidentified individual?A . Pseudonymous data.B . Anonymous data.C . Aggregated data.D . Imprecise data.View AnswerAnswer: B Explanation: Reference: https://ico.org.uk/media/1061/anonymisation-code.pdf
Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?
Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?A . The Open ID Federation.B . PCI Data Security Standards CouncilC . International Organization for Standardization.D . Personal Information Protection and Electronic Documents Act.View AnswerAnswer: A
Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...
Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?
Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?A . A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain...
Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?
Users of a web-based email service have their accounts breached through compromised login credentials . Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?A . Financial loss and blackmail.B . Financial loss and solicitation.C . Identity theft and embarrassment.D . Identity theft and the leaking...
Which of the following is considered a client-side IT risk?
Which of the following is considered a client-side IT risk?A . Security policies focus solely on internal corporate obligations.B . An organization increases the number of applications on its server.C . An employee stores his personal information on his company laptop.D . IDs used to avoid the use of personal...
A valid argument against data minimization is that it?
A valid argument against data minimization is that it?A . Can limit business opportunities.B . Decreases the speed of data transfers.C . Can have an adverse effect on data quality.D . Increases the chance that someone can be identified from data.View AnswerAnswer: A
What is a mistake organizations make when establishing privacy settings during the development of applications?
What is a mistake organizations make when establishing privacy settings during the development of applications?A . Providing a user with too many choices.B . Failing to use "Do Not Track” technology.C . Providing a user with too much third-party information.D . Failing to get explicit consent from a user on...
Which of the following should Kyle recommend to Jill as the best source of support for her initiative?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...