Next Question >>

Question 1/44

Which activity would best support the principle of data quality?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (44q)
Question 1: Which activity would best support the principle of data qual...
Question 2: What must be done to destroy data stored on "write once read...
Question 3: SCENARIO - Please use the following to answer the next quest...
Question 4: Which of the following is an example of the privacy risks as...
Question 5: Which is the most accurate type of biometrics?...
Question 6: What is the main benefit of using a private cloud?...
Question 7: SCENARIO - Please use the following to answer the next quest...
Question 8: What is true of providers of wireless technology?...
Question 9: Which of the following most embodies the principle of Data P...
Question 10: If you are asked to advise on privacy concerns regarding pai...
Question 11: How can a hacker gain control of a smartphone to perform rem...
Question 12: How does k-anonymity help to protect privacy in micro data s...
Question 13: What would be an example of an organization transferring the...
Question 14: What can be used to determine the type of data in storage wi...
Question 15: SCENARIO - Please use the following to answer the next quest...
Question 16: SCENARIO - Please use the following to answer the next quest...
Question 17: SCENARIO - Please use the following to answer the next quest...
Question 18: SCENARIO - Please use the following to answer the next quest...
Question 19: What is the best way to protect privacy on a geographic info...
Question 20: A user who owns a resource wants to give other individuals a...
Question 21: SCENARIO - Please use the following to answer the next quest...
Question 22: What is the main reason the Do Not Track (DNT) header is not...
Question 23: Which of the following would best improve an organization s ...
Question 24: How should the sharing of information within an organization...
Question 25: SCENARIO - Please use the following to answer the next quest...
Question 26: Which of the following is considered a records management be...
Question 27: After committing to a Privacy by Design program, which activ...
Question 28: What tactic does pharming use to achieve its goal?...
Question 29: SCENARIO - Please use the following to answer the next quest...
Question 30: Which is NOT a way to validate a person's identity?...
Question 31: What is the main function of a breach response center?...
Question 32: SCENARIO - Please use the following to answer the next quest...
Question 33: Which is NOT a suitable action to apply to data when the ret...
Question 34: SCENARIO - Please use the following to answer the next quest...
Question 35: Revocation and reissuing of compromised credentials is impos...
Question 36: What is a main benefit of data aggregation?...
Question 37: What is the potential advantage of homomorphic encryption?...
Question 38: SCENARIO - Please use the following to answer the next quest...
Question 39: A credit card with the last few numbers visible is an exampl...
Question 40: SCENARIO - Please use the following to answer the next quest...
Question 41: What is the distinguishing feature of asymmetric encryption?...
Question 42: What is the term for information provided to a social networ...
Question 43: What is the goal of privacy enhancing technologies (PETs) li...
Question 44: SCENARIO - Please use the following to answer the next quest...