What control would apply?
A user who owns a resource wants to give other individuals access to the resource. What control would apply?A . Mandatory access control. B. Role-based access controls. C. Discretionary access control. D. Context of authority controls.View AnswerAnswer: C
You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you fnd yourself considering an intriguing question: Can these people be sure that I am who I say I am?
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores fnancial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain...
Which is true regarding the type of encryption Lancelot uses?
SCENARIO Wesley Energy has fnally made its move, acquiring the venerable oil and gas exploration frm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. `The old...
What is the distinguishing feature of asymmetric encryption?
What is the distinguishing feature of asymmetric encryption?A . It has a stronger key for encryption than for decryption. B. It employs layered encryption using dissimilar methods. C. It uses distinct keys for encryption and decryption. D. It is designed to cross operating systems.View AnswerAnswer: C
Which of the following suggests the greatest degree of transparency?
Which of the following suggests the greatest degree of transparency?A . A privacy disclosure statement clearly articulates general purposes for collection B. The data subject has multiple opportunities to opt-out after collection has occurred. C. A privacy notice accommodates broadly defned future collections for new products. D. After reading the...
Which is NOT a drawback to using a biometric recognition system?
Which is NOT a drawback to using a biometric recognition system?A . It can require more maintenance and support. B. It can be more expensive than other systems C. It has limited compatibility across systems. D. It is difcult for people to use.View AnswerAnswer: D
Which data practice is Barney most likely focused on improving?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's...
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?A . Individual participation. B. Purpose specifcation. C. Collection limitation. D. Accountability.View AnswerAnswer: A
Granting data subjects the right to have data corrected, amended, or deleted describes?
Granting data subjects the right to have data corrected, amended, or deleted describes?A . Use limitation. B. Accountability. C. A security safeguard D. Individual participationView AnswerAnswer: D
What is the main beneft of using dummy data during software testing?
What is the main beneft of using dummy data during software testing?A . The data comes in a format convenient for testing. B. Statistical disclosure controls are applied to the data. C. The data enables the suppression of particular values in a set. D. Developers do not need special privacy...