لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his frst day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments. Kyle spent the morning in the IT department, where the CIO welcomed him and explained
A. Investors
B. Regulators
C. Industry groups
D. Corporate researchers
عرض الإجابة
اجابة صحيحة: C
السؤال #2
How should the sharing of information within an organization be documented?
A. With a binding contract
B. With a data flow diagram
C. With a disclosure statement
D. With a memorandum of agreement
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A credit card with the last few numbers visible is an example of what?
A. Masking datacorrect
B. Synthetic data
C. Sighting controls
D. Partial encryption
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A vendor has been collecting data under an old contract, not aligned with the practices of the organization. Which is the preferred response?
A. Destroy the data
B. Update the contract to bring the vendor into alignment
C. Continue the terms of the existing contract until it expires
D. Terminate the contract and begin a vendor selection process
عرض الإجابة
اجابة صحيحة: B
السؤال #5
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments. Kyle spent the morning in the IT department, where the CIO welcomed him and explained
A. Deletion
B. Inventory
C. Retention
D. Sharing
عرض الإجابة
اجابة صحيحة: C
السؤال #6
What must be used in conjunction with disk encryption?
A. Increased CPU speed
B. A strong password
C. A digital signature
D. Export controls
عرض الإجابة
اجابة صحيحة: B
السؤال #7
What is a mistake organizations make when establishing privacy settings during the development of applications?
A. Providing a user with too many choices
B. Failing to use "Do Not Track? technology
C. Providing a user with too much third-party information
D. Failing to get explicit consent from a user on the use of cookies
عرض الإجابة
اجابة صحيحة: D
السؤال #8
What is the main function of a breach response center?
A. Detecting internal security attacks
B. Addressing privacy incidents
C. Providing training to internal constituencies
D. Interfacing with privacy regulators and governmental bodies
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which of the following would best improve an organization' s system of limiting data use?
A. Implementing digital rights management technology
B. Confrming implied consent for any secondary use of data
C. Applying audit trails to resources to monitor company personnel
D. Instituting a system of user authentication for company personnel
عرض الإجابة
اجابة صحيحة: A
السؤال #10
What is the most important requirement to fulfill when transferring data out of an organization?
A. Ensuring the organization sending the data controls how the data is tagged by the receiver
B. Ensuring the organization receiving the data performs a privacy impact assessment
C. Ensuring the commitments made to the data owner are followed
D. Extending the data retention schedule as needed
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following statements describes an acceptable disclosure practice?
A. An organization's privacy policy discloses how data will be used among groups within the organization itself
B. With regard to limitation of use, internal disclosure policies override contractual agreements with third parties
C. Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors
D. When an organization discloses data to a vendor, the terms of the vendor' privacy notice prevail over the organization' privacy notice
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which is NOT a way to validate a person's identity?
A. Swiping a smartcard into an electronic reader
B. Using a program that creates random passwords
C. Answering a question about "something you know?
D. Selecting a picture and tracing a unique pattern on it
عرض الإجابة
اجابة صحيحة: B
السؤال #13
What is the distinguishing feature of asymmetric encryption?
A. It has a stronger key for encryption than for decryption
B. It employs layered encryption using dissimilar methods
C. It uses distinct keys for encryption and decryption
D. It is designed to cross operating systems
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?
A. The Open ID Federation
B. PCI Data Security Standards Council
C. International Organization for Standardization
D. Personal Information Protection and Electronic Documents Act
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
A. Verifying the accuracy of the data by contacting users
B. Validating the company's data collection procedures
C. Introducing erroneous data to see if its detected
D. Tracking changes to data through auditing
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which of the following would best improve an organization’ s system of limiting data use?
A. Implementing digital rights management technology
B. Confirming implied consent for any secondary use of data
C. Applying audit trails to resources to monitor company personnel
D. Instituting a system of user authentication for company personnel
عرض الإجابة
اجابة صحيحة: C
السؤال #17
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
A. The implied consent model provides the user with more detailed data collection information
B. To secure explicit consent, a user's website browsing would be significantly disrupted
C. An explicit consent model is more expensive to implement
D. Regulators prefer the implied consent model
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Granting data subjects the right to have data corrected, amended, or deleted describes?
A. Use limitation
B. Accountability
C. A security safeguard
D. Individual participationcorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #19
What is the main benefit of using dummy data during software testing?
A. The data comes in a format convenient for testing
B. Statistical disclosure controls are applied to the data
C. The data enables the suppression of particular values in a set
D. Developers do not need special privacy training to test the software
عرض الإجابة
اجابة صحيحة: D
السؤال #20
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, `I don't know what you are doing, but keep doing it!" But months later, the gift shop was in chaos. Carol reali
A. Collection limitation principles
B. Vendor management principles
C. Incident preparedness principles
D. Fair Information Practice Principlescorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #21
How does k-anonymity help to protect privacy in micro data sets?
A. By ensuring that every record in a set is part of a group of "k" records having similar identifying information
B. By switching values between records in order to preserve most statistics while still maintaining privacy
C. By adding sufcient noise to the data in order to hide the impact of any one individual
D. By top-coding all age data above a value of "k
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which activity would best support the principle of data quality?
A. Providing notice to the data subject regarding any change in the purpose for collecting such data
B. Ensuring that the number of teams processing personal information is limited
C. Delivering information in a format that the data subject understands
D. Ensuring that information remains accurate
عرض الإجابة
اجابة صحيحة: AD
السؤال #23
Which is NOT a drawback to using a biometric recognition system?
A. It can require more maintenance and support
B. It can be more expensive than other systems
C. It has limited compatibility across systems
D. It is difcult for people to use
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
A. Verifying the accuracy of the data by contacting users
B. Validating the company’s data collection procedures
C. Introducing erroneous data to see if its detected
D. Tracking changes to data through auditing
عرض الإجابة
اجابة صحيحة: A
السؤال #25
What can be used to determine the type of data in storage without exposing its contents?
A. Collection records
B. Data mapping
C. Server logs
D. Metadata
عرض الإجابة
اجابة صحيحة: D
السؤال #26
What must be done to destroy data stored on "write once read many" (WORM) media?
A. The data must be made inaccessible by encryption
B. The erase function must be used to remove all data
C. The media must be physically destroyed
D. The media must be reformatted
عرض الإجابة
اجابة صحيحة: C
السؤال #27
What is the potential advantage of homomorphic encryption?
A. Encrypted information can be analyzed without decrypting it frst
B. Ciphertext size decreases as the security level increases
C. It allows greater security and faster processing times
D. It makes data impenetrable to attacks
عرض الإجابة
اجابة صحيحة: A
السؤال #28
A key principle of an effective privacy policy is that it should be?
A. Written in enough detail to cover the majority of likely scenarios
B. Made general enough to maximize flexibility in its application
C. Presented with external parties as the intended audience
D. Designed primarily by the organization's lawyers
عرض الإجابة
اجابة صحيحة: C
السؤال #29
What is an example of a just-in-time notice?
A. A warning that a website may be unsafe
B. A full organizational privacy notice publicly available on a website
C. A credit card company calling a user to verify a purchase before it is authorized
D. Privacy information given to a user when he attempts to comment on an online article
عرض الإجابة
اجابة صحيحة: D
السؤال #30
SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!" But months later, the gift shop was in chaos. Carol reali
A. Collection limitation principles
B. Vendor management principles
C. Incident preparedness principles
D. Fair Information Practice Principlescorrect
عرض الإجابة
اجابة صحيحة: AD

View The Updated IAPP Exam Questions

SPOTO Provides 100% Real IAPP Exam Questions for You to Pass Your IAPP Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: