لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which is NOT a drawback to using a biometric recognition system?
A. It can require more maintenance and support
B. It can be more expensive than other systems
C. It has limited compatibility across systems
D. It is difficult for people to use
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which of the following would best improve an organization’ s system of limiting data use?
A. Implementing digital rights management technology
B. Confirming implied consent for any secondary use of data
C. Applying audit trails to resources to monitor company personnel
D. Instituting a system of user authentication for company personnel
عرض الإجابة
اجابة صحيحة: C
السؤال #3
During a transport layer security (TLS) session, what happens immediately after the web browser creates a random PreMasterSecret?
A. The server decrypts the PremasterSecret
B. The web browser opens a TLS connection to the PremasterSecret
C. The web browser encrypts the PremasterSecret with the server's public key
D. The server and client use the same algorithm to convert the PremasterSecret into an encryption key
عرض الإجابة
اجابة صحيحة: C
السؤال #4
SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app
A. Obtain consent before using personal health information for data analytics purposes
B. Provide the user with an option to select which personal data the application may collect
C. Disclose what personal data the application the collecting in the company Privacy Policy posted online
D. Document each personal category collected by the app and ensure it maps to an app function or feature
عرض الإجابة
اجابة صحيحة: C
السؤال #5
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal i
A. A provision that holds LeadOps liable for a data breach involving Clean-Q's information
B. A provision prescribing technical and organizational controls that LeadOps must implement
C. A provision that requires LeadOps to notify Clean-Q of any suspected breaches of information that involves customer or resource information managed on behalf of Clean-Q
D. A provision that allows Clean-Q to conduct audits of LeadOps’ information processing and information security environment, at LeadOps’ cost and at any time that Clean-Q requires
عرض الإجابة
اجابة صحيحة: D
السؤال #6
SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endle
A. Field transfer protocol
B. Cross-current translation
C. Near-field communication
D. Radio Frequency Identification
عرض الإجابة
اجابة صحيحة: C
السؤال #7
What was the first privacy framework to be developed?
A. OECD Privacy Principles
B. Generally Accepted Privacy Principles
C. Code of Fair Information Practice Principles (FIPPs)
D. The Asia-Pacific Economic Cooperation (APEC) Privacy Framework
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?
A. A group of hackers infiltrate a power grid and cause a major blackout
B. An insurance company raises a person’s rates based on driving habits gathered from a connected car
C. A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits
D. A water district fines an individual after a meter reading reveals excess water use during drought conditions
عرض الإجابة
اجابة صحيحة: B
السؤال #9
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
A. The implied consent model provides the user with more detailed data collection information
B. To secure explicit consent, a user's website browsing would be significantly disrupted
C. An explicit consent model is more expensive to implement
D. Regulators prefer the implied consent model
عرض الإجابة
اجابة صحيحة: A
السؤال #10
You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?
A. Remnant
B. Behavioral
C. Contextual
D. Demographic
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: