You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you fnd yourself considering an intriguing question: Can these people be sure that I am who I say I am?

SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores fnancial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain...

June 21, 2023 No Comments READ MORE +

Which is NOT a way to validate a person's identity?

Which is NOT a way to validate a person's identity?A . Swiping a smartcard into an electronic reader. B. Using a program that creates random passwords. C. Answering a question about "something you know×’. D. Selecting a picture and tracing a unique pattern on itView AnswerAnswer: B

June 21, 2023 No Comments READ MORE +

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?A . Verifying the accuracy of the data by contacting users. B. Validating the company's data collection procedures. C. Introducing erroneous data to see if its detected. D. Tracking changes to data through auditing.View...

June 21, 2023 No Comments READ MORE +

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?A . The implied consent model provides the user with more detailed data collection information. B. To secure explicit consent, a user's website browsing would be signifcantly disrupted. C....

June 21, 2023 No Comments READ MORE +

Which activity would best support the principle of data quality?

Which activity would best support the principle of data quality?A . Providing notice to the data subject regarding any change in the purpose for collecting such data. B. Ensuring that the number of teams processing personal information is limited. C. Delivering information in a format that the data subject understands....

June 20, 2023 No Comments READ MORE +

How does k-anonymity help to protect privacy in micro data sets?

How does k-anonymity help to protect privacy in micro data sets?A . By ensuring that every record in a set is part of a group of "k" records having similar identifying information. B. By switching values between records in order to preserve most statistics while still maintaining privacy. C. By...

June 20, 2023 No Comments READ MORE +

Which is the preferred response?

A vendor has been collecting data under an old contract, not aligned with the practices of the organization. Which is the preferred response?A . Destroy the data B. Update the contract to bring the vendor into alignment. C. Continue the terms of the existing contract until it expires. D. Terminate...

June 20, 2023 No Comments READ MORE +

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you fnd yourself considering an intriguing question: Can these people be sure that I am who I say I am?

SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores fnancial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain...

June 19, 2023 No Comments READ MORE +

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?A . The Open ID Federation. B. PCI Data Security Standards Council C. International Organization for Standardization. D. Personal Information Protection and Electronic Documents Act.View AnswerAnswer: A

June 19, 2023 No Comments READ MORE +

What is the main function of the Amnesic Incognito Live System or TAILS device?

What is the main function of the Amnesic Incognito Live System or TAILS device?A . It allows the user to run a self-contained computer from a USB device. B. It accesses systems with a credential that leaves no discernable tracks. C. It encrypts data stored on any computer on a...

June 18, 2023 No Comments READ MORE +