What is the main function of a breach response center?

What is the main function of a breach response center?A . Detecting internal security attacks. B. Addressing privacy incidents. C. Providing training to internal constituencies. D. Interfacing with privacy regulators and governmental bodies.View AnswerAnswer: B

June 14, 2023 No Comments READ MORE +

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's...

June 13, 2023 No Comments READ MORE +

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

SCENARIO Wesley Energy has fnally made its move, acquiring the venerable oil and gas exploration frm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. `The old...

June 13, 2023 No Comments READ MORE +

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?A . The Personal Data Ordinance. B. The EU Data Protection Directive. C. The Code of Fair Information Practices. D. The Organization for Economic Co-operation and Development (OECD) Privacy Principles.View AnswerAnswer: D

June 13, 2023 No Comments READ MORE +

What is the potential advantage of homomorphic encryption?

What is the potential advantage of homomorphic encryption?A . Encrypted information can be analyzed without decrypting it frst. B. Ciphertext size decreases as the security level increases. C. It allows greater security and faster processing times. D. It makes data impenetrable to attacks.View AnswerAnswer: A

June 11, 2023 No Comments READ MORE +

What is a mistake organizations make when establishing privacy settings during the development of applications?

What is a mistake organizations make when establishing privacy settings during the development of applications?A . Providing a user with too many choices. B. Failing to use "Do Not Track×’ technology. C. Providing a user with too much third-party information. D. Failing to get explicit consent from a user on...

June 11, 2023 No Comments READ MORE +

A credit card with the last few numbers visible is an example of what?

A credit card with the last few numbers visible is an example of what?A . Masking data B. Synthetic data C. Sighting controls. D. Partial encryptionView AnswerAnswer: A

June 11, 2023 No Comments READ MORE +

How should the sharing of information within an organization be documented?

How should the sharing of information within an organization be documented?A . With a binding contract. B. With a data fow diagram. C. With a disclosure statement. D. With a memorandum of agreement.View AnswerAnswer: B

June 11, 2023 No Comments READ MORE +

Carol replied, `Jane, that doesn't sound so bad. Could you just fx things and help us to post even more online?

SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...

June 11, 2023 No Comments READ MORE +

What can be used to determine the type of data in storage without exposing its contents?

What can be used to determine the type of data in storage without exposing its contents?A . Collection records. B. Data mapping. C. Server logs. D. Metadata.View AnswerAnswer: D

June 10, 2023 No Comments READ MORE +