Which of the following should Kyle recommend to Jill as the best source of support for her initiative?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's...
What must be done to destroy data stored on "write once read many" (WORM) media?
What must be done to destroy data stored on "write once read many" (WORM) media?A . The data must be made inaccessible by encryption.B . The erase function must be used to remove all data.C . The media must be physically destroyed.D . The media must be reformatted.View AnswerAnswer: C
What is the most important requirement to fulfill when transferring data out of an organization?
What is the most important requirement to fulfill when transferring data out of an organization?A . Ensuring the organization sending the data controls how the data is tagged by the receiver.B . Ensuring the organization receiving the data performs a privacy impact assessment.C . Ensuring the commitments made to the...
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance.B . The EU Data Protection Directive.C . The Code of Fair Information Practices.D . The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D...
What is the distinguishing feature of asymmetric encryption?
What is the distinguishing feature of asymmetric encryption?A . It has a stronger key for encryption than for decryption.B . It employs layered encryption using dissimilar methods.C . It uses distinct keys for encryption and decryption.D . It is designed to cross operating systems.View AnswerAnswer: C Explanation: Reference: https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functionsÂand-properties
Which two actions should you perform?
You are the Microsoft 365 administrator for a company. Users in the IT department must receive new Office 365 preview features before the features are deployed to other users in the company. You need to ensure only the users in the IT department receive preview features. Which two actions should...
What is the main function of a breach response center?
What is the main function of a breach response center?A . Detecting internal security attacks.B . Addressing privacy incidents.C . Providing training to internal constituencies.D . Interfacing with privacy regulators and governmental bodies.View AnswerAnswer: B
Which two actions should you perform?
You are the Microsoft 365 administrator for a company. Users in the IT department must receive new Office 365 preview features before the features are deployed to other users in the company. You need to ensure only the users in the IT department receive preview features. Which two actions should...
Which of the following statements describes an acceptable disclosure practice?
Which of the following statements describes an acceptable disclosure practice?A . An organization’s privacy policy discloses how data will be used among groups within the organization itself.B . With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.C . Intermediaries processing sensitive data on behalf...
Granting data subjects the right to have data corrected, amended, or deleted describes?
Granting data subjects the right to have data corrected, amended, or deleted describes?A . Use limitation.B . Accountability.C . A security safeguardD . Individual participationView AnswerAnswer: D Explanation: Reference: https://www.ncbi.nlm.nih.gov/books/NBK236546/