لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal i
A. A provision that holds LeadOps liable for a data breach involving Clean-Q's information
B. A provision prescribing technical and organizational controls that LeadOps must implement
C. A provision that requires LeadOps to notify Clean-Q of any suspected breaches of information that involves customer or resource information managed on behalf of Clean-Q
D. A provision that allows Clean-Q to conduct audits of LeadOps’ information processing and information security environment, at LeadOps’ cost and at any time that Clean-Q requires
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What tactic does pharming use to achieve its goal?
A. It modifies the user's Hosts file
B. It encrypts files on a user's computer
C. It creates a false display advertisement
D. It generates a malicious instant message
عرض الإجابة
اجابة صحيحة: C
السؤال #3
SCENARIO Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick
A. New Company should expect consumers to read the company’s privacy policy
B. New Company should manage stakeholder expectations for privacy even when the stakeholders‘ data is not held by New Company
C. New Company would best meet consumer expectations for privacy by adhering to legal requirements
D. New Company's commitment to stakeholders ends when the stakeholders’ data leaves New Company
عرض الإجابة
اجابة صحيحة: D
السؤال #4
When releasing aggregates, what must be performed to magnitude data to ensure privacy?
A. Value swapping
B. Noise addition
C. Basic rounding
D. Top coding
عرض الإجابة
اجابة صحيحة: B
السؤال #5
SCENARIO Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we mana
A. Retention
B. Disclosure
C. Collection
D. Use
عرض الإجابة
اجابة صحيحة: A
السؤال #6
What is true of providers of wireless technology?
A. They have the legal right in most countries to control and use any data on their systems
B. They can see all unencrypted data that crosses the system
C. They are typically exempt from data security regulations
D. They routinely backup data that crosses their system
عرض الإجابة
اجابة صحيحة: B
السؤال #7
After committing to a Privacy by Design program, which activity should take place first?
A. Create a privacy standard that applies to all projects and services
B. Establish a retention policy for all data being collected
C. Implement easy to use privacy settings for users
D. Perform privacy reviews on new projects
عرض الإجابة
اجابة صحيحة: B
السؤال #8
What is a main benefit of data aggregation?
A. It is a good way to perform analysis without needing a statistician
B. It applies two or more layers of protection to a single data record
C. It allows one to draw valid conclusions from small data samples
D. It is a good way to achieve de-identification and unlinkabilty
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: