- Other Question (205q)
- Q1. What is an Access Control List?
- Q2. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q3. SCENARIO Please use the following to answer the next questions: Your company is launching ...
- Q4. Granting data subjects the right to have data corrected, amended, or deleted describes?...
- Q5. What risk is mitigated when routing video traffic through a company's application servers,...
- Q6. An organization is reliant on temporary contractors for performing data analytics and they...
- Q7. In order to prevent others from identifying an individual within a data set, privacy engin...
- Q8. All of the following can be indications of a ransomware attack EXCEPT?...
- Q9. What is a main benefit of data aggregation?
- Q10. If you are asked to advise on privacy concerns regarding paid advertisements, which is the...
- Q11. SCENARIO - Please use the following to answer the next question: You have just been hired ...
- Q12. Which of the following entities would most likely be exempt from complying with the Genera...
- Q13. What distinguishes a "smart" device?
- Q14. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q15. Which of the following is the best method to minimize tracking through the use of cookies?...
- Q16. There are two groups of users. In a company, where one group Is allowed to see credit card...
- Q17. What has been identified as a significant privacy concern with chatbots?...
- Q18. What is the distinguishing feature of asymmetric encryption?...
- Q19. What is typically NOT performed by sophisticated Access Management (AM) techniques?...
- Q20. Which of the following is NOT a step in the methodology of a privacy risk framework?...
- Q21. Which of the following functionalities can meet some of the General Data Protection Regula...
- Q22. Which of the following occurs when an individual takes a specific observable action to ind...
- Q23. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q24. All of the following topics should be included in a workplace surveillance policy EXCEPT?...
- Q25. Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on t...
- Q26. SCENARIO - Please use the following to answer the next question: Carol was a US-based glas...
- Q27. What distinguishes a "smart" device?
- Q28. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q29. A sensitive biometrics authentication system is particularly susceptible to?...
- Q30. SCENARIO - Please use the following to answer the next question: Tom looked forward to sta...
- Q31. Which of the following CANNOT be effectively determined during a code audit?...
- Q32. An organization is deciding between building a solution in-house versus purchasing a solut...
- Q33. SCENARIO Please use the following to answer the next question: Jordan just joined a fitnes...
- Q34. SCENARIO - Please use the following to answer the next question: It should be the most sec...
- Q35. What is the main benefit of using dummy data during software testing?...
- Q36. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q37. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q38. What is the best way to protect privacy on a geographic information system (GIS)?...
- Q39. Which is NOT a drawback to using a biometric recognition system?...
- Q40. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q41. What is the most important requirement to fulfill when transferring data out of an organiz...
- Q42. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q43. An organization is using new technologies that will target and process personal data of EU...
- Q44. Why is first-party web tracking very difficult to prevent?...
- Q45. Which activity should the privacy technologist undertake to reduce potential privacy risk ...
- Q46. Which concept related to privacy choice is demonstrated by highlighting and bolding the "a...
- Q47. All of the following topics should be included in a workplace surveillance policy EXCEPT?...
- Q48. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q49. Granting data subjects the right to have data corrected, amended, or deleted describes?...
- Q50. An organization is using new technologies that will target and process personal data of EU...
- Q51. Combining multiple pieces of information about an individual to produce a whole that is gr...
- Q52. When analyzing user data, how is differential privacy applied?...
- Q53. What is the main benefit of using dummy data during software testing?...
- Q54. When designing a new system, which of the following is a privacy threat that the privacy t...
- Q55. What can be used to determine the type of data in storage without exposing its contents?...
- Q56. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q57. Many modern vehicles incorporate technologies that increase the convenience of drivers, bu...
- Q58. What must be done to destroy data stored on "write once read many" (WORM) media?...
- Q59. SCENARIO - Please use the following to answer the next question: Tom looked forward to sta...
- Q60. What Privacy by Design (PbD) element should include a de-identification or deletion plan?...
- Q61. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q62. What is the main issue pertaining to data protection with the use of 'deep fakes'?...
- Q63. Implementation of privacy controls for compliance with the requirements of the Children's ...
- Q64. What is the most effective first step to take to operationalize Privacy by Design principl...
- Q65. What is the goal of privacy enhancing technologies (PETS) like multiparty computation and ...
- Q66. Truncating the last octet of an IP address because it is NOT needed is an example of which...
- Q67. Which of the following most embodies the principle of Data Protection by Default?...
- Q68. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q69. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q70. SCENARIO - Please use the following to answer the next question: Looking back at your firs...
- Q71. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q72. A developer is designing a new system that allows an organization's helpdesk to remotely c...
- Q73. Organizations understand there are aggregation risks associated with the way the process t...
- Q74. A BaaS provider backs up the corporate data and stores it in an outsider provider under co...
- Q75. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q76. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q77. Which of the following entities would most likely be exempt from complying with the Genera...
- Q78. What was the first privacy framework to be developed?...
- Q79. Which of the following is most important to provide to the data subject before the collect...
- Q80. What is true of providers of wireless technology?...
- Q81. SCENARIO - Please use the following to answer the next question: Clean-Q is a company that...
- Q82. What would be an example of an organization transferring the risks associated with a data ...
- Q83. Which of the following is a privacy consideration for NOT sending large-scale SPAM type em...
- Q84. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q85. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q86. SCENARIO Tom looked forward to starting his new position with a U.S -based automobile leas...
- Q87. SCENARIO Please use the following to answer the next questions: Your company is launching ...
- Q88. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q89. In day to day interactions with technology, consumers are presented with privacy choices. ...
- Q90. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q91. How does k-anonymity help to protect privacy in micro data sets?...
- Q92. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q93. Which of the following is NOT relevant to a user exercising their data portability rights?...
- Q94. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q95. Which of the following is considered a records management best practice?...
- Q96. An EU marketing company is planning to make use of personal data captured to make automate...
- Q97. SCENARIO Tom looked forward to starting his new position with a U.S -based automobile leas...
- Q98. A developer is designing a new system that allows an organization's helpdesk to remotely c...
- Q99. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q100. A privacy technologist has been asked to aid in a forensic investigation on the darknet fo...
- Q101. A privacy engineer reviews a newly developed on-line registration page on a company's webs...
- Q102. SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. L...
- Q103. What is the best way to protect privacy on a geographic information system?...
- Q104. of the following best describes a network threat model and Its uses?...
- Q105. Which of the following is considered a records management best practice?...
- Q106. SCENARIO Please use the following to answer the next questions: Your company is launching ...
- Q107. In the realm of artificial intelligence, how has deep learning enabled greater implementat...
- Q108. What is the distinguishing feature of asymmetric encryption?...
- Q109. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q110. of the following best describes a network threat model and Its uses?...
- Q111. SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept th...
- Q112. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q113. A jurisdiction requiring an organization to place a link on the website that allows a cons...
- Q114. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q115. Information classification helps an organization protect confidential and nonpublic inform...
- Q116. SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor...
- Q117. A BaaS provider backs up the corporate data and stores it in an outsider provider under co...
- Q118. Which of the following would best improve an organization' s system of limiting data use?...
- Q119. Not updating software for a system that processes human resources data with the latest sec...
- Q120. Which of the following modes of interaction often target both people who personally know a...
- Q121. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q122. What logs should an application server retain in order to prevent phishing attacks while m...
- Q123. Which of the following became a foundation for privacy principles and practices of countri...
- Q124. SCENARIO Please use the following to answer the next question: Jordan just joined a fitnes...
- Q125. What is the main function of the Amnesic Incognito Live System or TAILS device?...
- Q126. What term describes two re-identifiable data sets that both come from the same unidentifie...
- Q127. After downloading and loading a mobile app, the user is presented with an account registra...
- Q128. A credit card with the last few numbers visible is an example of what?...
- Q129. Which of the following would be the most appropriate solution for preventing privacy viola...
- Q130. Which of the following does NOT illustrate the 'respect to user privacy' principle?...
- Q131. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q132. Which of the following is considered a client-side IT risk?...
- Q133. SCENARIO Looking back at your first two years as the Director of Personal Information Prot...
- Q134. How can a hacker gain control of a smartphone to perform remote audio and video surveillan...
- Q135. What would be an example of an organization transferring the risks associated with a data ...
- Q136. What element is most conducive to fostering a sound privacy by design culture in an organi...
- Q137. What is the main reason the Do Not Track (DNT) header is not acknowledged by more companie...
- Q138. Which of the following is a privacy consideration for NOT sending large-scale SPAM type em...
- Q139. What has been found to undermine the public key infrastructure system?...
- Q140. A sensitive biometrics authentication system is particularly susceptible to?...
- Q141. Which Organization for Economic Co-operation and Development (OECD) privacy protection pri...
- Q142. SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. L...
- Q143. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q144. SCENARIO Wesley Energy has finally made its move, acquiring the venerable oil and gas expl...
- Q145. SCENARIO Please use the following to answer next question: EnsureClaim is developing a mob...
- Q146. A healthcare provider would like to data mine information for research purposes however th...
- Q147. When releasing aggregates, what must be performed to magnitude data to ensure privacy?...
- Q148. SCENARIO Please use the following to answer the next questions: Your company is launching ...
- Q149. SCENARIO Please use the following to answer next question: EnsureClaim is developing a mob...
- Q150. A user who owns a resource wants to give other individuals access to the resource. What co...
- Q151. Granting data subjects the right to have data corrected, amended, or deleted describes?...
- Q152. A privacy technologist has been asked to aid in a forensic investigation on the darknet fo...
- Q153. Which is NOT a suitable action to apply to data when the retention period ends?...
- Q154. What would be an example of an organization transferring the risks associated with a data ...
- Q155. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q156. SCENARIO Please use the following to answer next question: EnsureClaim is developing a mob...
- Q157. What is the distinguishing feature of asymmetric encryption?...
- Q158. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q159. An organization is evaluating a number of Machine Learning (ML) solutions to help automate...
- Q160. A privacy engineer has been asked to review an online account login page. He finds there i...
- Q161. Which of the following is NOT a valid basis for data retention?...
- Q162. What is the goal of privacy enhancing technologies (PETs) like multiparty computation and ...
- Q163. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q164. Value Sensitive Design (VSD) focuses on which of the following?...
- Q165. What is the distinguishing feature of asymmetric encryption?...
- Q166. SCENARIO Kyle is a new security compliance manager who will be responsible for coordinatin...
- Q167. Which technique is most likely to facilitate the deletion of every instance of data associ...
- Q168. After stringent testing an organization has launched a new web-facing ordering system for ...
- Q169. Not updating software for a system that processes human resources data with the latest sec...
- Q170. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q171. Which of the following is NOT relevant to a user exercising their data portability rights?...
- Q172. What would be an example of an organization transferring the risks associated with a data ...
- Q173. Which privacy engineering objective proposed by the US National Institute of Science and T...
- Q174. After downloading and loading a mobile app, the user is presented with an account registra...
- Q175. A valid argument against data minimization is that it?...
- Q176. What is an Access Control List?
- Q177. SCENARIO It should be the most secure location housing data in all of Europe, if not the w...
- Q178. Implementation of privacy controls for compliance with the requirements of the Children's ...
- Q179. How does k-anonymity help to protect privacy in micro data sets?...
- Q180. What is the main benefit of using dummy data during software testing?...
- Q181. Which of the following is an example of the privacy risks associated with the Internet of ...
- Q182. Which of the following most embodies the principle of Data Protection by Default?...
- Q183. SCENARIO - Please use the following to answer the next question: Clean-Q is a company that...
- Q184. What is an example of a just-in-time notice?
- Q185. SCENARIO Looking back at your first two years as the Director of Personal Information Prot...
- Q186. SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The com...
- Q187. Which of the following suggests the greatest degree of transparency?...
- Q188. What is the main reason a company relies on implied consent instead of explicit consent fr...
- Q189. Which of the following is a stage in the data life cycle?...
- Q190. Ivan is a nurse for a home healthcare service provider in the US. The company has implemen...
- Q191. SCENARIO Please use the following to answer the next question: Light Blue Health (LBH) is ...
- Q192. A computer user navigates to a page on the Internet. The privacy notice pops up and the us...
- Q193. Which is the most accurate type of biometrics?...
- Q194. What is the key idea behind the "flow" component of Nissenbaum's contextual integrity mode...
- Q195. All of the following can be indications of a ransomware attack EXCEPT?...
- Q196. Which activity would best support the principle of data quality?...
- Q197. What has been found to undermine the public key infrastructure system?...
- Q198. What is the name of an alternative technique to counter the reduction in use of third-part...
- Q199. Information classification helps an organization protect confidential and nonpublic inform...
- Q200. A credit card with the last few numbers visible is an example of what?...
- Q201. SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything...
- Q202. When analyzing user data, how is differential privacy applied?...
- Q203. Which privacy engineering objective proposed by the US National Institute of Science and T...
- Q204. SCENARIO Please use the following to answer the next question: Jordan just joined a fitnes...
- Q205. What is the term for information provided to a social network by a member?...
