<< Prev Question Next Question >>

Question 12/48

SCENARIO
Please use the following to answer the next QUESTION:
Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients.
Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.
One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.
Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.
If this were a data breach, how is it likely to be categorized?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (48q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: Which of the following is TRUE about a PIA (Privacy Impact A...
Question 3: In which situation would a Privacy Impact Assessment (PIA) b...
Question 4: A Human Resources director at a company reported that a lapt...
Question 5: SCENARIO Please use the following to answer the next QUESTIO...
Question 6: An executive for a multinational online retail company in th...
Question 7: Under which circumstances would people who work in human res...
Question 8: SCENARIO Please use the following to answer the next QUESTIO...
Question 9: SCENARIO Please use the following to answer the next QUESTIO...
Question 10: SCENARIO Please use the following to answer the next QUESTIO...
Question 11: What is the main reason to begin with 3-5 key metrics during...
Question 12: SCENARIO Please use the following to answer the next QUESTIO...
Question 13: SCENARIO Please use the following to answer the next QUESTIO...
Question 14: Why were the nongovernmental privacy organizations, Electron...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: Rationalizing requirements in order to comply with the vario...
Question 17: Which of the following is NOT typically a function of a Priv...
Question 18: SCENARIO Please use the following to answer the next QUESTIO...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: Which of the following indicates you have developed the righ...
Question 22: What is one reason the European Union has enacted more compr...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: Which is the best way to view an organization's privacy fram...
Question 26: Which is NOT an influence on the privacy environment externa...
Question 27: SCENARIO Please use the following to answer the next QUESTIO...
Question 28: SCENARIO Please use the following to answer the next QUESTIO...
Question 29: SCENARIO Please use the following to answer the next QUESTIO...
Question 30: As a Data Protection Officer, one of your roles entails moni...
Question 31: SCENARIO Please use the following to answer the next QUESTIO...
Question 32: What is the main purpose of a privacy program audit?...
Question 33: SCENARIO Please use the following to answer the next QUESTIO...
Question 34: What is the function of the privacy operational life cycle?...
Question 35: SCENARIO Please use the following to answer the next QUESTIO...
Question 36: All of the following changes will likely trigger a data inve...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next QUESTIO...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: SCENARIO Please use the following to answer the next QUESTIO...
Question 41: Which of the following is an example of Privacy by Design (P...
Question 42: SCENARIO Please use the following to answer the next QUESTIO...
Question 43: Which of the following controls does the PCI DSS framework N...
Question 44: SCENARIO Please use the following to answer the next QUESTIO...
Question 45: Which is TRUE about the scope and authority of data protecti...
Question 46: Under the General Data Protection Regulation (GDPR), which s...
Question 47: Which of the following is TRUE about the Data Protection Imp...
Question 48: SCENARIO Please use the following to answer the next QUESTIO...