لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Please use the following to answer the next QUESTION. Manasa is a product manager at Omnipresent Omnimedia, where she is responsible for leading the development of the company’s flagship product, the Handy Helper. The Handy Helper is an application that can be used in the home to manage family calendars, do online shopping, and schedule doctor appointments. After having had a successful launch in the United States, the Handy Helper is about to be made available for purchase worldwide. The packaging
A. Storage of medical data in the cloud is not permissible under the General Data Protection Regulation (GDPR)
B. Data access is not limited to those who “need to know” for their role
C. Collection of data without a defined purpose might violate the fairness principle
D. Encryption of the data at rest prevents European users from having the right of access and the right of portability of their data
عرض الإجابة
اجابة صحيحة: C
السؤال #2
An organization's business continuity plan or disaster recovery plan does NOT typically include what?
A. Recovery time objectives
B. Emergency response guidelines
C. Statement of organizational responsibilities
D. Retention schedule for storage and destruction of information
عرض الإجابة
اجابة صحيحة: B
السؤال #3
SCENARIO Please use the following to answer the next QUESTION: Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information u
A. An open programming model that results in easy access
B. An unwillingness of cloud providers to provide security information
C. A lack of vendors in the cloud computing market
D. A reduced resilience of data structures that may lead to data loss
عرض الإجابة
اجابة صحيحة: D
السؤال #4
SCENARIO Please use the following to answer the next QUESTION: Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices and assess what her privacy priorities will be, P
A. Ace Space’s documented procedures
B. Ace Space’s employee training program
C. Ace Space’s vendor engagement protocols
D. Ace Space’s content sharing practices on social media
عرض الإجابة
اجابة صحيحة: B
السؤال #5
SCENARIO Please use the following to answer the next QUESTION: Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current user
A. Forensic inquiry
B. Data mapping
C. Privacy breach prevention
D. Vendor due diligence vetting
عرض الإجابة
اجابة صحيحة: C
السؤال #6
SCENARIO Please use the following to answer the next QUESTION: Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe. One Sunday morning, while using his work laptop to purchase tickets for an
A. Availability Breach
B. Authenticity Breach
C. Confidentiality Breach
D. Integrity Breach
عرض الإجابة
اجابة صحيحة: D
السؤال #7
SCENARIO Please use the following to answer the next QUESTION: Penny has recently joined Ace Space, a company that sells homeware accessories online, as its new privacy officer. The company is based in California but thanks to some great publicity from a social media influencer last year, the company has received an influx of sales from the EU and has set up a regional office in Ireland to support this expansion. To become familiar with Ace Space’s practices and assess what her privacy priorities will be, P
A. Audit rights
B. Liability for a data breach
C. Pricing for data security protections
D. The data a vendor will have access to
عرض الإجابة
اجابة صحيحة: D
السؤال #8
SCENARIO Please use the following to answer the next QUESTION: Amira is thrilled about the sudden expansion of NatGen. As the joint Chief Executive Officer (CEO) with her long-time business partner Sadie, Amira has watched the company grow into a major competitor in the green energy market. The current line of products includes wind turbines, solar energy panels, and equipment for geothermal systems. A talented team of developers means that NatGen's line of products will only continue to grow. With the expa
A. The company needs to have policies and procedures in place to guide the purchasing decisions
B. The privacy notice for customers and the Business Continuity Plan (BCP) still need to be reviewed
C. Staff members across departments need time to review technical information concerning any new databases
D. Senior staff members need to first commit to adopting a minimum number of Privacy Enhancing Technologies (PETs)
عرض الإجابة
اجابة صحيحة: C
السؤال #9
SCENARIO Please use the following to answer the next QUESTION: Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current user
A. Insist upon one-on-one consultation with each person who works around the privacy officer
B. Develop a metric showing the number of initiatives launched without consultation and include it in reports, presentations, and consultation
C. Hold discussions with the department head of anyone who fails to consult with the privacy officer
D. Take your concerns straight to the Chief Executive Officer
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Formosa International operates in 20 different countries including the United States and France. What organizational approach would make complying with a number of different regulations easier?
A. Data mapping
B. Fair Information Practices
C. Rationalizing requirements
D. Decentralized privacy management
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following is TRUE about a PIA (Privacy Impact Analysis)?
A. Any project that involves the use of personal data requires a PIA
B. A Data Protection Impact Analysis (DPIA) process includes a PIA
C. The PIA must be conducted at the early stages of the project lifecycle
D. The results from a previous information audit can be leveraged in a PIA process
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Read the following steps: Perform frequent data back-ups. Perform test restorations to verify integrity of backed-up data. Maintain backed-up data offline or on separate servers. These steps can help an organization recover from what?
A. Phishing attacks
B. Authorization errors
C. Ransomware attacks
D. Stolen encryption keys
عرض الإجابة
اجابة صحيحة: C
السؤال #13
SCENARIO Please use the following to answer the next QUESTION: You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks clarity and detail, but you presume that data was lost. When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that
A. The vendor’s representative does not have enough experience
B. Signing a contract with CRUDLOK which lasts longer than one year
C. The company did not collect enough identifiers to monitor one’s credit
D. You are going to notify affected individuals via a letter followed by an email
عرض الإجابة
اجابة صحيحة: A
السؤال #14
What is the main reason to begin with 3-5 key metrics during the program development process?
A. To avoid undue financial costs
B. To keep the focus on the main organizational objectives
C. To minimize selective data use
D. To keep the process limited to as few people as possible
عرض الإجابة
اجابة صحيحة: D
السؤال #15
What United States federal law requires financial institutions to declare their personal data collection practices?
A. The Kennedy-Hatch Disclosure Act of 1997
B. The Gramm-Leach-Bliley Act of 1999
C. SUPCLA, or the federal Superprivacy Act of 2001
D. The Financial Portability and Accountability Act of 2006
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Why were the nongovernmental privacy organizations, Electronic Frontier Foundation (EFF) and Electronic Privacy Information Center (EPIC), established?
A. To promote consumer confidence in the Internet industry
B. To improve the user experience during online shopping
C. To protect civil liberties and raise consumer awareness
D. To promote security on the Internet through strong encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #17
SCENARIO Please use the following to answer the next QUESTION: Natalia, CFO of the Nationwide Grill restaurant chain, had never seen her fellow executives so anxious. Last week, a data processing firm used by the company reported that its system may have been hacked, and customer data such as names, addresses, and birthdays may have been compromised. Although the attempt was proven unsuccessful, the scare has prompted several Nationwide Grill executives to Question the company's privacy program at today's m
A. The amount of responsibility that a data controller retains
B. The appropriate role of an organization's security department
C. The degree to which training can lessen the number of security incidents
D. The role of Human Resources employees in an organization's privacy program
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Under the General Data Protection Regulation (GDPR), which situation would be LEAST likely to require a Data Protection Impact Assessment (DPIA)?
A. A health clinic processing its patients’ genetic and health data
B. The use of a camera system to monitor driving behavior on highways
C. A Human Resources department using a tool to monitor its employees’ internet activity
D. An online magazine using a mailing list to send a generic daily digest to marketing emails
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which of the following is an example of Privacy by Design (PbD)?
A. A company hires a professional to structure a privacy program that anticipates the increasing demands of new laws
B. The human resources group develops a training program for employees to become certified in privacy policy
C. A labor union insists that the details of employers' data protection methods be documented in a new contract
D. The information technology group uses privacy considerations to inform the development of new networking software
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: