لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is an Access Control List?
A. A list of steps necessary for an individual to access a resource
B. A list that indicates the type of permission granted to each individual
C. A list showing the resources that an individual has permission to access
D. A list of individuals who have had their access privileges to a resource revoked
عرض الإجابة
اجابة صحيحة: C
السؤال #2
What is the best way to protect privacy on a geographic information system (GIS)?
A. Limiting the data provided to the system
B. Using a wireless encryption protocol
C. Scrambling location information
D. Using a firewall
عرض الإجابة
اجابة صحيحة: C
السؤال #3
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal i
A. Nothing at this stage as the Managing Director has made a decision
B. Determine if any Clean-Q competitors currently use LeadOps as a solution
C. Obtain a legal opinion from an external law firm on contracts management
D. Involve the Information Security team to understand in more detail the types of services and solutions LeadOps is proposing
عرض الإجابة
اجابة صحيحة: D
السؤال #4
SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app
A. Limiting access to the app to authorized personnel
B. Including non-transparent policies, terms and conditions in the app
C. Insufficiently deleting personal data after an account reaches its retention period
D. Not encrypting the health record when it is transferred to the Light Blue Health servers
عرض الإجابة
اجابة صحيحة: C
السؤال #5
SCENARIO Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick
A. New Company should expect consumers to read the company’s privacy policy
B. New Company should manage stakeholder expectations for privacy even when the stakeholders‘ data is not held by New Company
C. New Company would best meet consumer expectations for privacy by adhering to legal requirements
D. New Company's commitment to stakeholders ends when the stakeholders’ data leaves New Company
عرض الإجابة
اجابة صحيحة: B
السؤال #6
SCENARIO Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments. Kyle spent the morning in the IT department, where the CIO welcomed him and explained
A. Encryption keys were previously unavailable to the organization's cloud storage host
B. Signatureless advanced malware was detected at multiple points on the organization's networks
C. Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network
D. Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor
عرض الإجابة
اجابة صحيحة: B
السؤال #7
SCENARIO It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on y
A. A hidden network
B. A reluctant network
C. A user verified network
D. A wireless mesh network
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Not updating software for a system that processes human resources data with the latest security patches may create what?
A. Authentication issues
B. Privacy vulnerabilities
C. Privacy threat vectors
D. Reportable privacy violations
عرض الإجابة
اجابة صحيحة: C
السؤال #9
What is a main benefit of data aggregation?
A. It is a good way to perform analysis without needing a statistician
B. It applies two or more layers of protection to a single data record
C. It allows one to draw valid conclusions from small data samples
D. It is a good way to achieve de-identification and unlinkabilty
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls. Before implementation, a privacy technologist should conduct which of the following?
A. A Data Protection Impact Assessment (DPIA) and consultation with the appropriate regulator to ensure legal compliance
B. A privacy risk and impact assessment to evaluate potential risks from the proposed processing operations
C. A Legitimate Interest Assessment (LIA) to ensure that the processing is proportionate and does not override the privacy, rights and freedoms of the customers
D. A security assessment of the help desk solution and provider to assess if the technology was developed with a security by design approach
عرض الإجابة
اجابة صحيحة: C
السؤال #11
What is the term for information provided to a social network by a member?
A. Profile data
B. Declared data
C. Personal choice data
D. Identifier information
عرض الإجابة
اجابة صحيحة: A
السؤال #12
You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?
A. Remnant
B. Behavioral
C. Contextual
D. Demographic
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which technique is most likely to facilitate the deletion of every instance of data associated with a deleted user account from every data store held by an organization?
A. Auditing the code which deletes user accounts
B. Building a standardized and documented retention program for user data deletion
C. Monitoring each data store for presence of data associated with the deleted user account
D. Training engineering teams on the importance of deleting user accounts their associated data from all data stores when requested
عرض الإجابة
اجابة صحيحة: B
السؤال #14
What is typically NOT performed by sophisticated Access Management (AM) techniques?
A. Restricting access to data based on location
B. Restricting access to data based on user role
C. Preventing certain types of devices from accessing data
D. Preventing data from being placed in unprotected storage
عرض الإجابة
اجابة صحيحة: C
السؤال #15
How does k-anonymity help to protect privacy in micro data sets?
A. By ensuring that every record in a set is part of a group of "k" records having similar identifying information
B. By switching values between records in order to preserve most statistics while still maintaining privacy
C. By adding sufficient noise to the data in order to hide the impact of any one individual
D. By top-coding all age data above a value of "k
عرض الإجابة
اجابة صحيحة: A
السؤال #16
What is a mistake organizations make when establishing privacy settings during the development of applications?
A. Providing a user with too many choices
B. Failing to use "Do Not Track” technology
C. Providing a user with too much third-party information
D. Failing to get explicit consent from a user on the use of cookies
عرض الإجابة
اجابة صحيحة: C
السؤال #17
What is the goal of privacy enhancing technologies (PETS) like multiparty computation and differential privacy?
A. To facilitate audits of third party vendors
B. To protect sensitive data while maintaining its utility
C. To standardize privacy activities across organizational groups
D. To protect the security perimeter and the data items themselves
عرض الإجابة
اجابة صحيحة: D
السؤال #18
A user who owns a resource wants to give other individuals access to the resource. What control would apply?
A. Mandatory access control
B. Role-based access controls
C. Discretionary access control
D. Context of authority controls
عرض الإجابة
اجابة صحيحة: B
السؤال #19
How should the sharing of information within an organization be documented?
A. With a binding contract
B. With a data flow diagram
C. With a disclosure statement
D. With a memorandum of agreement
عرض الإجابة
اجابة صحيحة: C
السؤال #20
SCENARIO Please use the following to answer the next question: Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products,
A. Hashing
B. A2DP Bluetooth profile
C. Persistent unique identifier
D. Randomized MAC address
عرض الإجابة
اجابة صحيحة: B
السؤال #21
Which of the following is an example of drone “swarming”?
A. A drone filming a cyclist from above as he rides
B. A drone flying over a building site to gather data
C. Drones delivering retailers’ packages to private homes
D. Drones communicating with each other to perform a search and rescue
عرض الإجابة
اجابة صحيحة: D
السؤال #22
SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate,
A. Signed a data sharing agreement with AMP Payment Resources
B. Documented that Finley Motors has a legitimate interest to share Chuck’s information
C. Obtained verbal consent from Chuck and recorded it within internal systems
D. Provided notice of data sharing practices within the electronically signed rental agreement
عرض الإجابة
اجابة صحيحة: B
السؤال #23
What is the distinguishing feature of asymmetric encryption?
A. It has a stronger key for encryption than for decryption
B. It employs layered encryption using dissimilar methods
C. It uses distinct keys for encryption and decryption
D. It is designed to cross operating systems
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which of the following is considered a client-side IT risk?
A. Security policies focus solely on internal corporate obligations
B. An organization increases the number of applications on its server
C. An employee stores his personal information on his company laptop
D. IDs used to avoid the use of personal data map to personal data in another database
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: