What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?A . The implied consent model provides the user with more detailed data collection information.B . To secure explicit consent, a user's website browsing would be significantly disrupted.C ....
Which is NOT a drawback to using a biometric recognition system?
Which is NOT a drawback to using a biometric recognition system?A . It can require more maintenance and support.B . It can be more expensive than other systemsC . It has limited compatibility across systems.D . It is difficult for people to use.View AnswerAnswer: D
What is the main benefit of using a private cloud?
What is the main benefit of using a private cloud?A . The ability to use a backup system for personal files.B . The ability to outsource data support to a third party.C . The ability to restrict data access to employees and contractors.D . The ability to cut costs for...
Which of the following is considered a records management best practice?
Which of the following is considered a records management best practice?A . Archiving expired data records and files.B . Storing decryption keys with their associated backup systems.C . Implementing consistent handling practices across all record types.D . Using classification to determine access rules and retention policy.View AnswerAnswer: D
What control would apply?
A user who owns a resource wants to give other individuals access to the resource. What control would apply?A . Mandatory access control.B . Role-based access controls.C . Discretionary access control.D . Context of authority controls.View AnswerAnswer: C
How can a hacker gain control of a smartphone to perform remote audio and video surveillance?
How can a hacker gain control of a smartphone to perform remote audio and video surveillance?A . By performing cross-site scripting.B . By installing a roving bug on the phone.C . By manipulating geographic information systems.D . By accessing a phone's global positioning system satellite signal.View AnswerAnswer: B
What would be an example of an organization transferring the risks associated with a data breach?
What would be an example of an organization transferring the risks associated with a data breach?A . Using a third-party service to process credit card transactions. B. Encrypting sensitive personal data during collection and storage C. Purchasing insurance to cover the organization in case of a breach. D. Applying industry...
What is a main beneft of data aggregation?
What is a main beneft of data aggregation?A . It is a good way to perform analysis without needing a statistician. B. It applies two or more layers of protection to a single data record. C. It allows one to draw valid conclusions from small data samples. D. It is...
A key principle of an effective privacy policy is that it should be?
A key principle of an effective privacy policy is that it should be?A . Written in enough detail to cover the majority of likely scenarios. B. Made general enough to maximize fexibility in its application. C. Presented with external parties as the intended audience. D. Designed primarily by the organization's...
By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifcations and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn't wait to recommend his friend Ben who would be perfect for the job. Ted's implementation is most likely a response to what incident?
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's...