Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

A.

Encryption.

B.

Access Controls.

C.

De-identification.

D.

Multi-factor authentication.

Full Access
Question # 5

UESTION NO: 48

Which is NOT a drawback to using a biometric recognition system?

A.

It can require more maintenance and support.

B.

It can be more expensive than other systems

C.

It has limited compatibility across systems.

D.

It is difficult for people to use.

Full Access
Question # 6

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

A.

Phishing emails.

B.

Denial of service.

C.

Brute-force attacks.

D.

Social engineering.

Full Access
Question # 7

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Full Access
Question # 8

What tactic does pharming use to achieve its goal?

A.

It modifies the user's Hosts file.

B.

It encrypts files on a user's computer.

C.

It creates a false display advertisement.

D.

It generates a malicious instant message.

Full Access
Question # 9

A valid argument against data minimization is that it?

A.

Can limit business opportunities.

B.

Decreases the speed of data transfers.

C.

Can have an adverse effect on data quality.

D.

Increases the chance that someone can be identified from data.

Full Access
Question # 10

How should the sharing of information within an organization be documented?

A.

With a binding contract.

B.

With a data flow diagram.

C.

With a disclosure statement.

D.

With a memorandum of agreement.

Full Access
Question # 11

Which of the following is the least effective privacy preserving practice in the Systems Development Life Cycle (SDLC)?

A.

Conducting privacy threat modeling for the use-case.

B.

Following secure and privacy coding standards in the development.

C.

Developing data flow modeling to identify sources and destinations of sensitive data.

D.

Reviewing the code against Open Web Application Security Project (OWASP) Top 10 Security Risks.

Full Access
Question # 12

What element is most conducive to fostering a sound privacy by design culture in an organization?

A.

Ensuring all employees acknowledge and understood the privacy policy.

B.

Frequent privacy and security awareness training for employees.

C.

Monthly reviews of organizational privacy principles.

D.

Gaining advocacy from senior management.

Full Access
Question # 13

How can a hacker gain control of a smartphone to perform remote audio and video surveillance?

A.

By performing cross-site scripting.

B.

By installing a roving bug on the phone.

C.

By manipulating geographic information systems.

D.

By accessing a phone's global positioning system satellite signal.

Full Access
Question # 14

All of the following topics should be included in a workplace surveillance policy EXCEPT?

A.

Who can be tracked and when.

B.

Who can access surveillance data.

C.

What areas can be placed under surveillance.

D.

Who benefits from collecting surveillance data.

Full Access
Question # 15

What is the potential advantage of homomorphic encryption?

A.

Encrypted information can be analyzed without decrypting it first.

B.

Ciphertext size decreases as the security level increases.

C.

It allows greater security and faster processing times.

D.

It makes data impenetrable to attacks.

Full Access
Question # 16

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

What is the best way to ensure that the application only collects personal data that is needed to fulfill its primary purpose of providing potential medical and healthcare recommendations?

A.

Obtain consent before using personal health information for data analytics purposes.

B.

Provide the user with an option to select which personal data the application may collect.

C.

Disclose what personal data the application the collecting in the company Privacy Policy posted online.

D.

Document each personal category collected by the app and ensure it maps to an app function or feature.

Full Access
Question # 17

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

A.

Implementing a mandatory privacy review and legal approval process.

B.

Obtain leadership buy-in for a mandatory privacy review and approval process.

C.

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.

D.

Conduct annual Privacy by Design training and refreshers for all impacted personnel.

Full Access
Question # 18

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

What type of principles would be the best guide for Jane's ideas regarding a new data management program?

A.

Collection limitation principles.

B.

Vendor management principles.

C.

Incident preparedness principles.

D.

Fair Information Practice Principles

Full Access
Question # 19

Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?

A.

Biometric data.

B.

Picture passwords.

C.

Personal identification number.

D.

Radio frequency identification.

Full Access
Question # 20

After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation:

Statement 1 reads: “Please check this box to confirm you have read and accept the terms and conditions of the end user license agreement” and includes a hyperlink to the terms and conditions.

Statement 2 reads: “Please check this box to confirm you have read and understood the privacy notice” and includes a hyperlink to the privacy notice.

Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?

A.

Consent.

B.

Vital interests.

C.

Legal obligation.

D.

Legitimate interests.

Full Access
Question # 21

Which of the following suggests the greatest degree of transparency?

A.

A privacy disclosure statement clearly articulates general purposes for collection

B.

The data subject has multiple opportunities to opt-out after collection has occurred.

C.

A privacy notice accommodates broadly defined future collections for new products.

D.

After reading the privacy notice, a data subject confidently infers how her information will be used.

Full Access
Question # 22

Organizations understand there are aggregation risks associated with the way the process their customer’s data. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

A.

Risk transfer.

B.

Risk mitigation.

C.

Risk avoidance.

D.

Risk acceptance.

Full Access
Question # 23

What must be used in conjunction with disk encryption?

A.

Increased CPU speed.

B.

A strong password.

C.

A digital signature.

D.

Export controls.

Full Access
Question # 24

Which technique is most likely to facilitate the deletion of every instance of data associated with a deleted user account from every data store held by an organization?

A.

Auditing the code which deletes user accounts.

B.

Building a standardized and documented retention program for user data deletion.

C.

Monitoring each data store for presence of data associated with the deleted user account.

D.

Training engineering teams on the importance of deleting user accounts their associated data from all data stores when requested.

Full Access
Question # 25

A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?

A.

Geofencing

B.

Geo-tracking

C.

Geo-tagging

D.

Geolocation

Full Access
Question # 26

it Is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

A.

Breaches of an individual's data.

B.

Illicit collection of personal data.

C.

Manipulation of a user's choice.

D.

Discrimination from profiling.

Full Access
Question # 27

An organization's customers have suffered a number of data breaches through successful social engineering attacks. One potential solution to remediate and prevent future occurrences would be to implement which of the following?

A.

Differential identifiability.

B.

Multi-factor authentication.

C.

Greater password complexity.

D.

Attribute-based access control.

Full Access
Question # 28

Information classification helps an organization protect confidential and nonpublic information primarily because?

A.

It helps identify sensitive and critical information that require very strict safeguards.

B.

It falls under the security principles of confidentiality, integrity, and availability.

C.

It promotes employee accountability for safeguarding confidential information.

D.

It is legally required under most regulations.

Full Access
Question # 29

Properly configured databases and well-written website codes are the best protection against what online threat?

A.

Pharming.

B.

SQL injection.

C.

Malware execution.

D.

System modification.

Full Access
Question # 30

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Full Access
Question # 31

After stringent testing an organization has launched a new web-facing ordering system for its consumer medical products. As the medical products could provide indicators of health conditions, the organization could further strengthen its privacy controls by deploying?

A.

Run time behavior monitoring.

B.

A content delivery network.

C.

Context aware computing.

D.

Differential identifiability.

Full Access
Question # 32

A key principle of an effective privacy policy is that it should be?

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Full Access
Question # 33

Which of the following would best improve an organization’ s system of limiting data use?

A.

Implementing digital rights management technology.

B.

Confirming implied consent for any secondary use of data.

C.

Applying audit trails to resources to monitor company personnel.

D.

Instituting a system of user authentication for company personnel.

Full Access
Question # 34

What is the goal of privacy enhancing technologies (PETS) like multiparty computation and differential privacy?

A.

To facilitate audits of third party vendors.

B.

To protect sensitive data while maintaining its utility.

C.

To standardize privacy activities across organizational groups.

D.

To protect the security perimeter and the data items themselves.

Full Access
Question # 35

Which Privacy by Design principle requires architects and operators to emphasize the interests of the individual by offering measures such as strong privacy defaults, appropriate

notice, and user-friendly options?

A.

Data lifecycle protection.

B.

Embedded into design.

C.

Respect for user privacy.

D.

Proactive not reactive.

Full Access
Question # 36

What is the main issue pertaining to data protection with the use of 'deep fakes'?

A.

Misinformation.

B.

Non-conformity with the accuracy principle.

C.

Issues with establishing non-repudiation.

D.

Issues with confidentiality of the information.

Full Access
Question # 37

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

A.

Categorization.

B.

Remediation.

C.

Retention.

D.

Security

Full Access
Question # 38

Users of a web-based email service have their accounts breached through compromised login credentials. Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?

A.

Financial loss and blackmail.

B.

Financial loss and solicitation.

C.

Identity theft and embarrassment.

D.

Identity theft and the leaking of information.

Full Access
Question # 39

All of the following can be indications of a ransomware attack EXCEPT?

A.

The inability to access certain files.

B.

An increased amount of spam email in an individual's inbox.

C.

An increase in activity of the CPU of a computer for no apparent reason.

D.

The detection of suspicious network communications between the ransomware and the attacker's command and control servers.

Full Access
Question # 40

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

A.

Relationship of family member

B.

Phone number

C.

Dale of birth

D.

Citizenship

Full Access
Question # 41

Which of the following statements best describes the relationship between privacy and security?

A.

Security systems can be used to enforce compliance with privacy policies.

B.

Privacy and security are independent; organizations must decide which should by emphasized.

C.

Privacy restricts access to personal information; security regulates how information should be used.

D.

Privacy protects data from being viewed during collection and security governs how collected data should be shared.

Full Access
Question # 42

Which of the following statements is true regarding software notifications and agreements?

A.

Website visitors must view the site’s privacy statement before downloading software.

B.

Software agreements are designed to be brief, while notifications provide more details.

C.

It is a good practice to provide users with information about privacy prior to software installation.

D.

“Just in time” software agreement notifications provide users with a final opportunity to modify the agreement.

Full Access
Question # 43

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

What measures can protect client information stored at GFDC?

A.

De-linking of data into client-specific packets.

B.

Cloud-based applications.

C.

Server-side controls.

D.

Data pruning

Full Access
Question # 44

Which of these is considered an ethical dark pattern on privacy?

A.

Using attractive designs to influence an individual.

B.

Rewarding users for providing more personal information

C.

Giving users more privacy options in relation to their personal information

D.

Providing dear and simple privacy notices to users

Full Access
Question # 45

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Ted's implementation is most likely a response to what incident?

A.

Encryption keys were previously unavailable to the organization's cloud storage host.

B.

Signatureless advanced malware was detected at multiple points on the organization's networks.

C.

Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network.

D.

Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor.

Full Access
Question # 46

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

What type of wireless network does GFDC seem to employ?

A.

A hidden network.

B.

A reluctant network.

C.

A user verified network.

D.

A wireless mesh network.

Full Access
Question # 47

Which of the following would be an example of an "objective" privacy harm to an individual, based on Calo's Harm Dimensions?

A.

Receiving spam following the sale of an email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Personal data inaccuracies present in a user's social media profile.

Full Access
Question # 48

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Full Access
Question # 49

An EU marketing company is planning to make use of personal data captured to make automated decisions based on profiling. In some cases, processing and automated decisions may have a legal effect on individuals, such as credit worthiness.

When evaluating the implementation of systems making automated decisions, in which situation would the company have to accommodate an individual’s right NOT to be subject to such processing to ensure compliance under the General Data Protection Regulation (GDPR)?

A.

When an individual’s legal status or rights are not affected by the decision.

B.

When there is no human intervention or influence in the decision-making process.

C.

When the individual has given explicit consent to such processing and suitable safeguards exist.

D.

When the decision is necessary for entering into a contract and the individual can contest the decision.

Full Access
Question # 50

How does k-anonymity help to protect privacy in micro data sets?

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

D.

By top-coding all age data above a value of "k."

Full Access
Question # 51

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?

A.

Unseen web beacons that combine information on multiple users.

B.

Latent keys that trigger malware when an advertisement is selected.

C.

Personal information collected by cookies linked to the advertising network.

D.

Sensitive information from Structured Query Language (SQL) commands that may be exposed.

Full Access
Question # 52

Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?

A.

Express consent.

B.

Implied consent.

C.

Informed notice.

D.

Authorized notice.

Full Access
Question # 53

When releasing aggregates, what must be performed to magnitude data to ensure privacy?

A.

Value swapping.

B.

Noise addition.

C.

Basic rounding.

D.

Top coding.

Full Access
Question # 54

An organization is reliant on temporary contractors for performing data analytics and they require access to personal data via software-as-a-service to perform their job. When the temporary contractor completes their work assignment, what woul^.be the most effective way to safeguard privacy and access to personal data when they leave?

A.

Set a system-based expiry that requires management reauthorization for online access for accounts that have been active more than 6 months.

B.

Establish a predetermined automatic account expiration date based on contract timescales.

C.

Require temporary contractors to sign a non-disclosure agreement, security acceptable use policy, and online access authorizations by hiring managers.

D.

Mandate hiring managers to email IT or Security team when the contractor leaves.

Full Access
Question # 55

An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?

A.

Transfer the data to another location.

B.

Invoke the appropriate deletion clause in the cloud terms and conditions.

C.

Obtain a destruction certificate from the cloud vendor.

D.

Destroy all encryption keys associated with the data.

Full Access
Question # 56

Between November 30th and December 2nd, 2013, cybercriminals successfully infected the credit card payment systems and bypassed security controls of a United States-based retailer with malware that exfiltrated 40 million credit card numbers. Six months prior, the retailer had malware detection software installed to prevent against such an attack.

Which of the following would best explain why the retailer’s consumer data was still exfiltrated?

A.

The detection software alerted the retailer’s security operations center per protocol, but the information security personnel failed to act upon the alerts.

B.

The U.S Department of Justice informed the retailer of the security breach on Dec. 12th, but the retailer took three days to confirm the breach and eradicate the malware.

C.

The IT systems and security measures utilized by the retailer’s third-party vendors were in compliance with industry standards, but their credentials were stolen by black hat hackers who then entered the retailer’s system.

D.

The retailer’s network that transferred personal data and customer payments was separate from the rest of the corporate network, but the malware code was disguised with the name of software that is supposed to protect this information.

Full Access
Question # 57

What has been found to undermine the public key infrastructure system?

A.

Man-in-the-middle attacks.

B.

Inability to track abandoned keys.

C.

Disreputable certificate authorities.

D.

Browsers missing a copy of the certificate authority's public key.

Full Access
Question # 58

Which of these actions is NOT generally part of the responsibility of an IT or software engineer?

A.

Providing feedback on privacy policies.

B.

Implementing multi-factor authentication.

C.

Certifying compliance with security and privacy law.

D.

Building privacy controls into the organization’s IT systems or software.

Full Access
Question # 59

Which of the following would be an example of an "objective" privacy harm to an individual?

A.

Receiving spam following the sale an of email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Inaccuracies in personal data.

Full Access
Question # 60

Which of the following is the most important action to take prior to collecting personal data directly from a customer?

A.

Define what data needs to be collected.

B.

Define the purpose for collecting and using the data.

C.

Identify business requirements for the data that will be collected.

D.

Provide individuals with information about how their data will be used after collection.

Full Access
Question # 61

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

A.

An individual with an RFID receiver can track people or consumer products.

B.

An individual can scramble computer transmissions in weapons systems.

C.

An individual can use an RFID receiver to engage in video surveillance.

D.

An individual can tap mobile phone communications.

Full Access
Question # 62

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

Which regulator has jurisdiction over the shop's data management practices?

A.

The Federal Trade Commission.

B.

The Department of Commerce.

C.

The Data Protection Authority.

D.

The Federal Communications Commission.

Full Access
Question # 63

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

A.

Investors.

B.

Regulators.

C.

Industry groups.

D.

Corporate researchers.

Full Access
Question # 64

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?

A.

Nothing at this stage as the Managing Director has made a decision.

B.

Determine if any Clean-Q competitors currently use LeadOps as a solution.

C.

Obtain a legal opinion from an external law firm on contracts management.

D.

Involve the Information Security team to understand in more detail the types of services and solutions LeadOps is proposing.

Full Access
Question # 65

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

What is likely to be the biggest privacy concern with the current 'Information Sharing and Consent' page?

A.

The ON or OFF default setting for each item.

B.

The navigation needed in the app to get to the consent page.

C.

The option to consent to receive potential marketing information.

D.

The information sharing with healthcare providers affiliated with the company.

Full Access
Question # 66

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?

A.

Cloud file transfer services.

B.

Certificate Authority (CA).

C.

HyperText Transfer Protocol (HTTP).

D.

Transport Layer Security (TLS).

Full Access