لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Please use the following to answer the next QUESTION: It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It
A. User risk training
B. Biometric security
C. Encryption of the data
D. Frequent data backups
عرض الإجابة
اجابة صحيحة: A
السؤال #2
In regards to the collection of personal data conducted by an organization, what must the data subject be allowed to do?
A. Evaluate the qualifications of a third-party processor before any data is transferred to that processor
B. Obtain a guarantee of prompt notification in instances involving unauthorized access of the data
C. Set a time-limit as to how long the personal data may be stored by the organization
D. Challenge the authenticity of the personal data and have it corrected if needed
عرض الإجابة
اجابة صحيحة: C
السؤال #3
What is one obligation that the General Data Protection Regulation (GDPR) imposes on data processors?
A. To honor all data access requests from data subjects
B. To inform data subjects about the identity and contact details of the controller
C. To implement appropriate technical and organizational measures that ensure an appropriate level of security
D. To carry out data protection impact assessments in cases where processing is likely to result in high risk to the rights and freedoms of individuals
عرض الإجابة
اجابة صحيحة: C
السؤال #4
What does it mean to “rationalize” data protection requirements?
A. Evaluate the costs and risks of applicable laws and regulations and address those that have the greatest penalties
B. Look for overlaps in laws and regulations from which a common solution can be developed
C. Determine where laws and regulations are redundant in order to eliminate some from requiring compliance
D. Address the less stringent laws and regulations, and inform stakeholders why they are applicable
عرض الإجابة
اجابة صحيحة: C
السؤال #5
“Collection”, “access” and “destruction” are aspects of what privacy management process?
A. The data governance strategy
B. The breach response plan
C. The metric life cycle
D. The business case
عرض الإجابة
اجابة صحيحة: B
السؤال #6
SCENARIO Please use the following to answer the next QUESTION: It's just what you were afraid of. Without consulting you, the information technology director at your organization launched a new initiative to encourage employees to use personal devices for conducting business. The initiative made purchasing a new, high-specification laptop computer an attractive option, with discounted laptops paid for as a payroll deduction spread over a year of paychecks. The organization is also paying the sales taxes. It
A. The use of personal equipment is a cost-effective measure that leads to no greater security risks than are always present in a modern organization
B. Any computer or other equipment is company property whenever it is used for company business
C. While the company may not own the equipment, it is required to protect the business-related data on any equipment used by its employees
D. The use of personal equipment must be reduced as it leads to inevitable security risks
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which statement is FALSE regarding the use of technical security controls?
A. Technical security controls are part of a data governance strategy
B. Technical security controls deployed for one jurisdiction often satisfy another jurisdiction
C. Most privacy legislation lists the types of technical security controls that must be implemented
D. A person with security knowledge should be involved with the deployment of technical security controls
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following is TRUE about the Data Protection Impact Assessment (DPIA) process as required under the General Data Protection Regulation (GDPR)?
A. The DPIA result must be reported to the corresponding supervisory authority
B. The DPIA report must be published to demonstrate the transparency of the data processing
C. The DPIA must include a description of the proposed processing operation and its purpose
D. The DPIA is required if the processing activity entails risk to the rights and freedoms of an EU individual
عرض الإجابة
اجابة صحيحة: D
السؤال #9
SCENARIO Please use the following to answer the next QUESTION: Natalia, CFO of the Nationwide Grill restaurant chain, had never seen her fellow executives so anxious. Last week, a data processing firm used by the company reported that its system may have been hacked, and customer data such as names, addresses, and birthdays may have been compromised. Although the attempt was proven unsuccessful, the scare has prompted several Nationwide Grill executives to Question the company's privacy program at today's m
A. Requiring the vendor to perform periodic internal audits
B. Specifying mandatory data protection practices in vendor contracts
C. Keeping the majority of processing activities within the organization
D. Obtaining customer consent for any third-party processing of personal data
عرض الإجابة
اجابة صحيحة: C
السؤال #10
SCENARIO Please use the following to answer the next QUESTION: Henry Home Furnishings has built high-end furniture for nearly forty years. However, the new owner, Anton, has found some degree of disorganization after touring the company headquarters. His uncle Henry had always focused on production – not data processing – and Anton is concerned. In several storage rooms, he has found paper files, disks, and old computers that appear to contain the personal data of current and former employees and customers.
A. Customer communication
B. Employee access to electronic storage
C. Employee advisement regarding legal matters
D. Controlled access at the company headquarters
عرض الإجابة
اجابة صحيحة: A
السؤال #11
SCENARIO Please use the following to answer the next QUESTION: Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all
A. All faxes sent from the office must be documented and the phone number used must be double checked to ensure a safe arrival
B. All unused copies, prints, and faxes must be discarded in a designated recycling bin located near the work station and emptied daily
C. Before any copiers, printers, or fax machines are replaced or resold, the hard drives of these devices must be deleted before leaving the office
D. When sending a print job containing personal data, the user must not leave the information visible on the computer screen following the print command and must retrieve the printed document immediately
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: