What is the potential advantage of homomorphic encryption?
What is the potential advantage of homomorphic encryption?A . Encrypted information can be analyzed without decrypting it frst. B. Ciphertext size decreases as the security level increases. C. It allows greater security and faster processing times. D. It makes data impenetrable to attacks.View AnswerAnswer: A
What is a mistake organizations make when establishing privacy settings during the development of applications?
What is a mistake organizations make when establishing privacy settings during the development of applications?A . Providing a user with too many choices. B. Failing to use "Do Not Track×’ technology. C. Providing a user with too much third-party information. D. Failing to get explicit consent from a user on...
A credit card with the last few numbers visible is an example of what?
A credit card with the last few numbers visible is an example of what?A . Masking data B. Synthetic data C. Sighting controls. D. Partial encryptionView AnswerAnswer: A
How should the sharing of information within an organization be documented?
How should the sharing of information within an organization be documented?A . With a binding contract. B. With a data fow diagram. C. With a disclosure statement. D. With a memorandum of agreement.View AnswerAnswer: B
Carol replied, `Jane, that doesn't sound so bad. Could you just fx things and help us to post even more online?
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...
What can be used to determine the type of data in storage without exposing its contents?
What can be used to determine the type of data in storage without exposing its contents?A . Collection records. B. Data mapping. C. Server logs. D. Metadata.View AnswerAnswer: D
What is the most important requirement to fulfll when transferring data out of an organization?
What is the most important requirement to fulfll when transferring data out of an organization?A . Ensuring the organization sending the data controls how the data is tagged by the receiver. B. Ensuring the organization receiving the data performs a privacy impact assessment. C. Ensuring the commitments made to the...
What must be used in conjunction with disk encryption?
What must be used in conjunction with disk encryption?A . Increased CPU speed. B. A strong password. C. A digital signature. D. Export controls.View AnswerAnswer: B
A valid argument against data minimization is that it?
A valid argument against data minimization is that it?A . Can limit business opportunities. B. Decreases the speed of data transfers. C. Can have an adverse effect on data quality. D. Increases the chance that someone can be identifed from data.View AnswerAnswer: A
Carol replied, `Jane, that doesn't sound so bad. Could you just fx things and help us to post even more online?
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it...