What must be done to destroy data stored on "write once read many" (WORM) media?
What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C
What is the most important requirement to fulfill when transferring data out of an organization?
What is the most important requirement to fulfill when transferring data out of an organization?A . Ensuring the organization sending the data controls how the data is tagged by the receiver.B . Ensuring the organization receiving the data performs a privacy impact assessment.C . Ensuring the commitments made to the...
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance.B . The EU Data Protection Directive.C . The Code of Fair Information Practices.D . The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D...
What is the distinguishing feature of asymmetric encryption?
What is the distinguishing feature of asymmetric encryption?A . It has a stronger key for encryption than for decryption.B . It employs layered encryption using dissimilar methods.C . It uses distinct keys for encryption and decryption.D . It is designed to cross operating systems.View AnswerAnswer: C Explanation: Reference: https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functionsÂand-properties
Which two actions should you perform?
You are the Microsoft 365 administrator for a company. Users in the IT department must receive new Office 365 preview features before the features are deployed to other users in the company. You need to ensure only the users in the IT department receive preview features. Which two actions should...
What is the main function of a breach response center?
What is the main function of a breach response center?A . Detecting internal security attacks.B . Addressing privacy incidents.C . Providing training to internal constituencies.D . Interfacing with privacy regulators and governmental bodies.View AnswerAnswer: B
Which two actions should you perform?
You are the Microsoft 365 administrator for a company. Users in the IT department must receive new Office 365 preview features before the features are deployed to other users in the company. You need to ensure only the users in the IT department receive preview features. Which two actions should...
Which of the following statements describes an acceptable disclosure practice?
Which of the following statements describes an acceptable disclosure practice?A . An organization’s privacy policy discloses how data will be used among groups within the organization itself.B . With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.C . Intermediaries processing sensitive data on behalf...
Granting data subjects the right to have data corrected, amended, or deleted describes?
Granting data subjects the right to have data corrected, amended, or deleted describes?A . Use limitation.B . Accountability.C . A security safeguardD . Individual participationView AnswerAnswer: D Explanation: Reference: https://www.ncbi.nlm.nih.gov/books/NBK236546/
What was the first privacy framework to be developed?
What was the first privacy framework to be developed?A . OECD Privacy Principles.B . Generally Accepted Privacy Principles.C . Code of Fair Information Practice Principles (FIPPs).D . The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.View AnswerAnswer: A Explanation: Reference: http://oecdprivacy.org