A) external auditor
B) information owner
C) IT security professionals
D) management
Correct Answer
verified
Multiple Choice
A) 2
B) 5
C) 7
D) 10
Correct Answer
verified
Multiple Choice
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Correct Answer
verified
Multiple Choice
A) transmitted over the Internet.
B) stored on a hard drive.
C) printed on a report.
D) None of the above
Correct Answer
verified
Multiple Choice
A) identification of information to be protected
B) backing up the information
C) controlling access to the information
D) training
Correct Answer
verified
Multiple Choice
A) asymmetric encryption.
B) digital certificate.
C) digital signature.
D) public key.
Correct Answer
verified
Multiple Choice
A) the Health Insurance Portability and Accountability Act
B) the Health Information Technology for Economic and Clinical Heath Act
C) the Financial Services Modernization Act
D) the Affordable Care Act
Correct Answer
verified
Multiple Choice
A) telemarketing.
B) spam.
C) direct mail.
D) MLM.
Correct Answer
verified
Multiple Choice
A) Collection
B) Access
C) Security
D) Monitoring and enforcement
Correct Answer
verified
Multiple Choice
A) what sensitive information is possessed by the organization.
B) where sensitive information is stored.
C) who has access to sensitive information.
D) All of the above are first steps in protecting privacy.
Correct Answer
verified
Multiple Choice
A) different keys; the same key
B) a decrypting algorithm; an encrypting algorithm
C) the same key; two separate keys
D) an encrypting algorithm; a decrypting algorithm
Correct Answer
verified
Multiple Choice
A) security.
B) confidentiality.
C) privacy.
D) availability.
Correct Answer
verified
Multiple Choice
A) The information needs to be placed in a secure,central area.
B) The information needs to be encrypted.
C) The information needs to be classified in terms of its value to the organization.
D) The information needs to be depreciated.
Correct Answer
verified
Multiple Choice
A) Provide free credit report monitoring for customers.
B) Inform customers of the option to opt-out of data collection and use of their personal information.
C) Allow customers' browsers to decline to accept cookies.
D) Utilize controls to prevent unauthorized access to,and disclosure of,customers' information.
Correct Answer
verified
Multiple Choice
A) asymmetric encryption.
B) certificate authority.
C) digital signature.
D) public key infrastructure.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Collection
B) Access
C) Security
D) Choice and consent
Correct Answer
verified
Multiple Choice
A) anti-virus software
B) data loss prevention software
C) a digital watermark
D) information rights software
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) asymmetric encryption
B) encryption
C) hashing
D) symmetric encryption
Correct Answer
verified
Showing 21 - 40 of 51
Related Exams