لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
How should the sharing of information within an organization be documented?
A. With a binding contract
B. With a data flow diagram
C. With a disclosure statement
D. With a memorandum of agreement
عرض الإجابة
اجابة صحيحة: C
السؤال #2
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on y
A. De-linking of data into client-specific packets
B. Cloud-based applications
C. Server-side controls
D. Data pruning
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following statements describes an acceptable disclosure practice?
A. An organization’s privacy policy discloses how data will be used among groups within the organization itself
B. With regard to limitation of use, internal disclosure policies override contractual agreements with third parties
C. Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors
D. When an organization discloses data to a vendor, the terms of the vendor’ privacy notice prevail over the organization’ privacy notice
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following is considered a records management best practice?
A. Archiving expired data records and files
B. Storing decryption keys with their associated backup systems
C. Implementing consistent handling practices across all record types
D. Using classification to determine access rules and retention policy
عرض الإجابة
اجابة صحيحة: D
السؤال #5
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on y
A. Record encryption is asymmetric, a stronger control measure
B. Record encryption is granular, limiting the damage of potential breaches
C. Record encryption involves tag masking, so its metadata cannot be decrypted
D. Record encryption allows for encryption of personal data only
عرض الإجابة
اجابة صحيحة: B
السؤال #6
How does k-anonymity help to protect privacy in micro data sets?
A. By ensuring that every record in a set is part of a group of "k" records having similar identifying information
B. By switching values between records in order to preserve most statistics while still maintaining privacy
C. By adding sufficient noise to the data in order to hide the impact of any one individual
D. By top-coding all age data above a value of "k
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A credit card with the last few numbers visible is an example of what?
A. Masking data
B. Synthetic data
C. Sighting controls
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A vendor has been collecting data under an old contract, not aligned with the practices of the organization. Which is the preferred response?
A. Destroy the data
B. Update the contract to bring the vendor into alignment
C. Continue the terms of the existing contract until it expires
D. Terminate the contract and begin a vendor selection process
عرض الإجابة
اجابة صحيحة: B
السؤال #9
What must be used in conjunction with disk encryption?
A. Increased CPU speed
B. A strong password
C. A digital signature
D. Export controls
عرض الإجابة
اجابة صحيحة: C
السؤال #10
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on y
A. A hidden network
B. A reluctant network
C. A user verified network
D. A wireless mesh network
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following would best improve an organization’ s system of limiting data use?
A. Implementing digital rights management technology
B. Confirming implied consent for any secondary use of data
C. Applying audit trails to resources to monitor company personnel
D. Instituting a system of user authentication for company personnel
عرض الإجابة
اجابة صحيحة: C
السؤال #12
SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete. For instanc
A. It employs the data scrambling technique known as obfuscation
B. Its decryption key is derived from its encryption key
C. It uses a single key for encryption and decryption
D. It is a data masking methodology
عرض الإجابة
اجابة صحيحة: C
السؤال #13
What is an example of a just-in-time notice?
A. A warning that a website may be unsafe
B. A full organizational privacy notice publicly available on a website
C. A credit card company calling a user to verify a purchase before itis authorized
D. Privacy information given to a user when he attempts to comment on an online article
عرض الإجابة
اجابة صحيحة: D
السؤال #14
What is the potential advantage of homomorphic encryption?
A. Encrypted information can be analyzed without decrypting it first
B. Ciphertext size decreases as the security level increases
C. It allows greater security and faster processing times
D. It makes data impenetrable to attacks
عرض الإجابة
اجابة صحيحة: C
السؤال #15
What must be done to destroy data stored on "write once read many" (WORM) media?
A. The data must be made inaccessible by encryption
B. The erase function must be used to remove all data
C. The media must be physically destroyed
D. The media must be reformatted
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: