لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we mana
A. Personal Information Protection and Electronic Documents Act
B. Health Insurance Portability and Accountability Act
C. The Health Records Act 2001
D. The European Union Directive 95/46/EC
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A user who owns a resource wants to give other individuals access to the resource. What control would apply?
A. Mandatory access control
B. Role-based access controls
C. Discretionary access control
D. Context of authority controls
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?
A. Individual participation
B. Purpose specification
C. Collection limitation
D. Accountability
عرض الإجابة
اجابة صحيحة: C
السؤال #4
What has been found to undermine the public key infrastructure system?
A. Man-in-the-middle attacks
B. Inability to track abandoned keys
C. Disreputable certificate authorities
D. Browsers missing a copy of the certificate authority's public key
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A key principle of an effective privacy policy is that it should be?
A. Written in enough detail to cover the majority of likely scenarios
B. Made general enough to maximize flexibility in its application
C. Presented with external parties as the intended audience
D. Designed primarily by the organization's lawyers
عرض الإجابة
اجابة صحيحة: C
السؤال #6
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on y
A. Record encryption is asymmetric, a stronger control measure
B. Record encryption is granular, limiting the damage of potential breaches
C. Record encryption involves tag masking, so its metadata cannot be decrypted
D. Record encryption allows for encryption of personal data only
عرض الإجابة
اجابة صحيحة: B
السؤال #7
SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete. For instanc
A. It employs the data scrambling technique known as obfuscation
B. Its decryption key is derived from its encryption key
C. It uses a single key for encryption and decryption
D. It is a data masking methodology
عرض الإجابة
اجابة صحيحة: C
السؤال #8
SCENARIO Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick
A. Hiding wireless service set identifiers (SSID)
B. Retaining the password assigned by the network
C. Employing Wired Equivalent Privacy (WEP) encryption
D. Using tokens sent through HTTP sites to verify user identity
عرض الإجابة
اجابة صحيحة: A
السؤال #9
What can be used to determine the type of data in storage without exposing its contents?
A. Collection records
B. Data mapping
C. Server logs
D. Metadata
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?
A. The Personal Data Ordinance
B. The EU Data Protection Directive
C. The Code of Fair Information Practices
D. The Organization for Economic Co-operation and Development (OECD) Privacy Principles
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?
A. The Open ID Federation
B. PCI Data Security Standards Council
C. International Organization for Standardization
D. Personal Information Protection and Electronic Documents Act
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: