لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Please use the following to answer the next QUESTION: Natalia, CFO of the Nationwide Grill restaurant chain, had never seen her fellow executives so anxious. Last week, a data processing firm used by the company reported that its system may have been hacked, and customer data such as names, addresses, and birthdays may have been compromised. Although the attempt was proven unsuccessful, the scare has prompted several Nationwide Grill executives to Question the company's privacy program at today's m
A. Varying the modes of communication
B. Communicating to the staff more often
C. Improving inter-departmental cooperation
D. Requiring acknowledgment of company memos
عرض الإجابة
اجابة صحيحة: B
السؤال #2
What is the main purpose in notifying data subjects of a data breach?
A. To avoid financial penalties and legal liability
B. To enable regulators to understand trends and developments that may shape the law
C. To ensure organizations have accountability for the sufficiency of their security measures
D. To allow individuals to take any actions required to protect themselves from possible consequences
عرض الإجابة
اجابة صحيحة: C
السؤال #3
What is the main purpose of a privacy program audit?
A. To mitigate the effects of a privacy breach
B. To justify a privacy department budget increase
C. To make decisions on privacy staff roles and responsibilities
D. To ensure the adequacy of data protection procedures
عرض الإجابة
اجابة صحيحة: C
السؤال #4
What are you doing if you succumb to "overgeneralization" when analyzing data from metrics?
A. Using data that is too broad to capture specific meanings
B. Possessing too many types of data to perform a valid analysis
C. Using limited data in an attempt to support broad conclusions
D. Trying to use several measurements to gauge one aspect of a program
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Under which circumstances would people who work in human resources be considered a secondary audience for privacy metrics?
A. They do not receive training on privacy issues
B. They do not interface with the financial office
C. They do not have privacy policy as their main task
D. They do not have frequent interactions with the public
عرض الإجابة
اجابة صحيحة: B
السؤال #6
SCENARIO Please use the following to answer the next QUESTION: As the Director of data protection for Consolidated Records Corporation, you are justifiably pleased with your accomplishments so far. Your hiring was precipitated by warnings from regulatory agencies following a series of relatively minor data breaches that could easily have been worse. However, you have not had a reportable incident for the three years that you have been with the company. In fact, you consider your program a model that others
A. Assess
B. Protect
C. Respond
D. Sustain
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Under the General Data Protection Regulation (GDPR), which of the following situations would LEAST likely require a controller to notify a data subject?
A. An encrypted USB key with sensitive personal data is stolen
B. A direct marketing email is sent with recipients visible in the ‘cc’ field
C. Personal data of a group of individuals is erroneously sent to the wrong mailing list
D. A hacker publishes usernames, phone numbers and purchase history online after a cyber-attack
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What is the key factor that lays the foundation for all other elements of a privacy program?
A. The applicable privacy regulations
B. The structure of a privacy team
C. A privacy mission statement
D. A responsible internal stakeholder
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following indicates you have developed the right privacy framework for your organization?
A. It includes a privacy assessment of each major system
B. It improves the consistency of the privacy program
C. It works at a different type of organization
D. It identifies all key stakeholders by name
عرض الإجابة
اجابة صحيحة: D
السؤال #10
SCENARIO Please use the following to answer the next QUESTION: Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information u
A. Restrict the vendor to using company security controls
B. Offer company resources to assist with the processing
C. Include transfer prohibitions in the vendor contract
D. Lock the data down in its current location
عرض الإجابة
اجابة صحيحة: C
السؤال #11
What is the main function of the Asia-Pacific Economic Cooperation Privacy Framework?
A. Enabling regional data transfers
B. Protecting data from parties outside the region
C. Establishing legal requirements for privacy protection in the region
D. Marketing privacy protection technologies developed in the region
عرض الإجابة
اجابة صحيحة: A
السؤال #12
SCENARIO Please use the following to answer the next QUESTION: As the Director of data protection for Consolidated Records Corporation, you are justifiably pleased with your accomplishments so far. Your hiring was precipitated by warnings from regulatory agencies following a series of relatively minor data breaches that could easily have been worse. However, you have not had a reportable incident for the three years that you have been with the company. In fact, you consider your program a model that others
A. Through targeted curricula designed for specific departments
B. By adopting e-learning to reduce the need for instructors
C. By using industry standard off-the-shelf programs
D. Through a review of recent data breaches
عرض الإجابة
اجابة صحيحة: A
السؤال #13
SCENARIO Please use the following to answer the next QUESTION: Your organization, the Chicago (U.S.)-based Society for Urban Greenspace, has used the same vendor to operate all aspects of an online store for several years. As a small nonprofit, the Society cannot afford the higher-priced options, but you have been relatively satisfied with this budget vendor, Shopping Cart Saver (SCS). Yes, there have been some issues. Twice, people who purchased items from the store have had their credit card information u
A. Include notification provisions in the vendor contract
B. Arrange regular telephone check-ins reviewing expectations
C. Send a memorandum of understanding on breach notification
D. Email the regulations that require breach notifications
عرض الإجابة
اجابة صحيحة: D
السؤال #14
SCENARIO Please use the following to answer the next QUESTION: As they company’s new chief executive officer, Thomas Goddard wants to be known as a leader in data protection. Goddard recently served as the chief financial officer of Hoopy.com, a pioneer in online video viewing with millions of users around the world. Unfortunately, Hoopy is infamous within privacy protection circles for its ethically questionable practices, including unauthorized sales of personal data to marketers. Hoopy also was the targe
A. Hold a meeting with stakeholders to create an interdepartmental protocol for new initiatives
B. Institute Privacy by Design principles and practices across the organization
C. Develop a plan for introducing privacy protections into the product development stage
D. Conduct a gap analysis after deployment of new products, then mend any gaps that are revealed
عرض الإجابة
اجابة صحيحة: C
السؤال #15
SCENARIO Please use the following to answer the next QUESTION: John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe. During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Bein
A. Privacy compliance
B. Security commitment
C. Certifications to relevant frameworks
D. Data breach notification to A&M LLP
عرض الإجابة
اجابة صحيحة: D
السؤال #16
SCENARIO Please use the following to answer the next QUESTION: You lead the privacy office for a company that handles information from individuals living in several countries throughout Europe and the Americas. You begin that morning’s privacy review when a contracts officer sends you a message asking for a phone call. The message lacks clarity and detail, but you presume that data was lost. When you contact the contracts officer, he tells you that he received a letter in the mail from a vendor stating that
A. Informing the affected individuals that data from other individuals may have also been affected
B. Collecting more personally identifiable information than necessary to provide updates to the affected individuals
C. Using a postcard with the logo of the vendor who make the mistake instead of your company’s logo
D. Trusting a vendor to send out a notice when they already failed once by not encrypting the database
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: