<< Prev Question Next Question >>

Question 42/89

A systems audit uncovered a shared drive folder containing sensitive employee data with no access controls and therefore was available for all employees to view. What is the first step to mitigate further risks?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (89q)
Question 1: SCENARIO Please use the following to answer the next QUESTIO...
Question 2: SCENARIO Please use the following to answer the next QUESTIO...
Question 3: SCENARIO Please use the following to answer the next questio...
Question 4: SCENARIO Please use the following to answer the next questio...
Question 5: What is the name for the privacy strategy model that describ...
Question 6: SCENARIO Please use the following to answer the next QUESTIO...
Question 7: SCENARIO Please use the following to answer the next QUESTIO...
Question 8: What is the key factor that lays the foundation for all othe...
Question 9: An executive for a multinational online retail company in th...
Question 10: SCENARIO Please use the following to answer the next questio...
Question 11: SCENARIO Please use the following to answer the next QUESTIO...
Question 12: SCENARIO Please use the following to answer the next questio...
Question 13: Data retention and destruction policies should meet all of t...
Question 14: SCENARIO Please use the following to answer the next QUESTIO...
Question 15: SCENARIO Please use the following to answer the next QUESTIO...
Question 16: SCENARIO Please use the following to answer the next questio...
Question 17: You would like your organization to be independently audited...
Question 18: Which of the following is TRUE about the Data Protection Imp...
Question 19: SCENARIO Please use the following to answer the next QUESTIO...
Question 20: SCENARIO Please use the following to answer the next QUESTIO...
Question 21: SCENARIO Please use the following to answer the next questio...
Question 22: SCENARIO Please use the following to answer the next QUESTIO...
Question 23: SCENARIO Please use the following to answer the next QUESTIO...
Question 24: SCENARIO Please use the following to answer the next QUESTIO...
Question 25: SCENARIO Please use the following to answer the next questio...
Question 26: SCENARIO Please use the following to answer the next questio...
1 commentQuestion 27: In regards to the collection of personal data conducted by a...
1 commentQuestion 28: SCENARIO Please use the following to answer the next QUESTIO...
9 commentQuestion 29: Which is the best way to view an organization's privacy fram...
Question 30: SCENARIO Please use the following to answer the next QUESTIO...
Question 31: SCENARIO Please use the following to answer the next questio...
Question 32: SCENARIO Please use the following to answer the next QUESTIO...
Question 33: SCENARIO Please use the following to answer the next questio...
Question 34: SCENARIO Please use the following to answer the next QUESTIO...
Question 35: SCENARIO Please use the following to answer the next questio...
Question 36: SCENARIO Please use the following to answer the next questio...
Question 37: SCENARIO Please use the following to answer the next QUESTIO...
Question 38: SCENARIO Please use the following to answer the next questio...
Question 39: SCENARIO Please use the following to answer the next QUESTIO...
Question 40: Which term describes a piece of personal data that alone may...
Question 41: Which will best assist you in quickly identifying weaknesses...
Question 42: A systems audit uncovered a shared drive folder containing s...
Question 43: All of the following changes will likely trigger a data inve...
Question 44: An organization's business continuity plan or disaster recov...
Question 45: SCENARIO Please use the following to answer the next QUESTIO...
Question 46: SCENARIO Please use the following to answer the next QUESTIO...
Question 47: SCENARIO Please use the following to answer the next questio...
Question 48: SCENARIO Please use the following to answer the next questio...
Question 49: Which is NOT an influence on the privacy environment externa...
Question 50: SCENARIO Please use the following to answer the next questio...
Question 51: SCENARIO Please use the following to answer the next questio...
Question 52: "Collection," "access" and "destruction" are aspects of what...
Question 53: In a sample metric template, what does "target" mean?...
Question 54: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 55: SCENARIO Please use the following to answer the next QUESTIO...
Question 56: You would like to better understand how your organization ca...
Question 57: SCENARIO Please use the following to answer the next QUESTIO...
Question 58: Which of the following is NOT a type of privacy program metr...
Question 59: SCENARIO Please use the following to answer the next questio...
Question 60: SCENARIO Please use the following to answer the next QUESTIO...
Question 61: SCENARIO Please use the following to answer the next QUESTIO...
Question 62: SCENARIO Please use the following to answer the next QUESTIO...
Question 63: SCENARIO Please use the following to answer the next QUESTIO...
Question 64: When supporting the business and data privacy program expand...
Question 65: When building a data privacy program, what is a good startin...
Question 66: The General Data Protection Regulation (GDPR) specifies fine...
Question 67: What is one obligation that the General Data Protection Regu...
Question 68: What is the main purpose in notifying data subjects of a dat...
Question 69: While trying to e-mail her manager, an employee has e-mailed...
Question 70: If your organization has a recurring issue with colleagues n...
1 commentQuestion 71: Under the General Data Protection Regulation (GDPR), when wo...
Question 72: SCENARIO Please use the following to answer the next QUESTIO...
Question 73: SCENARIO Please use the following to answer the next questio...
Question 74: Which of the following indicates you have developed the righ...
1 commentQuestion 75: SCENARIO Please use the following to answer the next QUESTIO...
1 commentQuestion 76: Which statement is FALSE regarding the use of technical secu...
Question 77: If done correctly, how can a Data Protection Impact Assessme...
Question 78: For an organization that has just experienced a data breach,...
Question 79: SCENARIO Please use the following to answer the next QUESTIO...
Question 80: What have experts identified as an important trend in privac...
Question 81: SCENARIO Please use the following to answer the next QUESTIO...
Question 82: SCENARIO Please use the following to answer the next questio...
Question 83: There are different forms of monitoring available for organi...
Question 84: An organization is establishing a mission statement for its ...
Question 85: SCENARIO Please use the following to answer the next QUESTIO...
Question 86: SCENARIO Please use the following to answer the next QUESTIO...
Question 87: In addition to regulatory requirements and business practice...
Question 88: SCENARIO Please use the following to answer the next QUESTIO...
Question 89: SCENARIO Please use the following to answer the next QUESTIO...