لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker. The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's pr
A. Data flows use encryption for data at rest, as defined by the IT manager
B. AmaZure sends newsletter to WebTracker customers, as approved by the Marketing Manager
C. Employees’ personal data are being stored in a cloud HR system, as approved by the HR Manager
D. File Integrity Monitoring is being deployed in SQL servers, as indicated by the IT Architect Manager
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which of the following is considered a client-side IT risk?
A. Security policies focus solely on internal corporate obligations
B. An organization increases the number of applications on its server
C. An employee stores his personal information on his company laptop
D. IDs used to avoid the use of personal data map to personal data in another database
عرض الإجابة
اجابة صحيحة: C
السؤال #3
What was the first privacy framework to be developed?
A. OECD Privacy Principles
B. Generally Accepted Privacy Principles
C. Code of Fair Information Practice Principles (FIPPs)
D. The Asia-Pacific Economic Cooperation (APEC) Privacy Framework
عرض الإجابة
اجابة صحيحة: A
السؤال #4
What is the distinguishing feature of asymmetric encryption?
A. It has a stronger key for encryption than for decryption
B. It employs layered encryption using dissimilar methods
C. It uses distinct keys for encryption and decryption
D. Itis designed to cross operating systems
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
A. Verifying the accuracy of the data by contacting users
B. Validating the company’s data collection procedures
C. Introducing erroneous data to see if its detected
D. Tracking changes to data through auditing
عرض الإجابة
اجابة صحيحة: A
السؤال #6
How does k-anonymity help to protect privacy in micro data sets?
A. By ensuring that every record in a set is part of a group of "k" records having similar identifying information
B. By switching values between records in order to preserve most statistics while still maintaining privacy
C. By adding sufficient noise to the data in order to hide the impact of any one individual
D. By top-coding all age data above a value of "k
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which is NOT a suitable action to apply to data when the retention period ends?
A. Aggregation
B. De-identification
C. Deletion
D. Retagging
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What is the main function of a breach response center?
A. Detecting internal security attacks
B. Addressing privacy incidents
C. Providing training to internal constituencies
D. Interfacing with privacy regulators and governmental bodies
عرض الإجابة
اجابة صحيحة: B
السؤال #9
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal i
A. Understanding LeadOps’ costing model
B. Establishing a relationship with the Managing Director of LeadOps
C. Recognizing the value of LeadOps’ website holding a verified security certificate
D. Obtaining knowledge of LeadOps' information handling practices and information security environment
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A key principle of an effective privacy policy is that it should be?
A. Written in enough detail to cover the majority of likely scenarios
B. Made general enough to maximize flexibility in its application
C. Presented with external parties as the intended audience
D. Designed primarily by the organization's lawyers
عرض الإجابة
اجابة صحيحة: C
السؤال #11
SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker. The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's pr
A. Verify that WebTracker's HR and Payroll systems implement the current privacy notice (after the typos are fixed)
B. Review the list of subcontractors employed by AmaZure and ensure these are included in the formal agreement with WebTracker
C. Evaluate and review the basis for processing employees’ personal data in the context of the prototype created by WebTracker and approved by the CEO
D. Confirm whether the data transfer from London to the USA has been fully approved by AmaZure and the appropriate institutions in the USA and the European Union
عرض الإجابة
اجابة صحيحة: B
السؤال #12
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments. Kyle spent the morning in the IT department, where the CIO welcomed him and explained
A. Encryption keys were previously unavailable to the organization's cloud storage host
B. Signatureless advanced malware was detected at multiple points on the organization's networks
C. Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network
D. Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor
عرض الإجابة
اجابة صحيحة: A
السؤال #13
SCENARIO Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we mana
A. Asymmetric Encryption
B. Symmetric Encryption
C. Obfuscation
D. Hashing
عرض الإجابة
اجابة صحيحة: D
السؤال #14
What is the goal of privacy enhancing technologies (PETS) like multiparty computation and differential privacy?
A. To facilitate audits of third party vendors
B. To protect sensitive data while maintaining its utility
C. To standardize privacy activities across organizational groups
D. To protect the security perimeter and the data items themselves
عرض الإجابة
اجابة صحيحة: C
السؤال #15
To comply with the Sarbanes-Oxley Act (SOX), public companies in the United States are required to annually report on the effectiveness of the auditing controls of their financial reporting systems. These controls must be implemented to prevent unauthorized use, disclosure, modification, and damage or loss of financial data. Why do these controls ensure both the privacy and security of data?
A. Modification of data is an aspect of privacy; unauthorized use, disclosure, and damage or loss of data are aspects of security
B. Unauthorized use of data is an aspect of privacy; disclosure, modification, and damage or loss of data are aspects of security
D. Damage or loss of data are aspects of privacy; disclosure, unauthorized use, and modification of data are aspects of privacy
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: