Database Management > QUESTIONS & ANSWERS > CIPP/US test Questions & Answers (All)
CIPP/US test Questions & Answers Data confidentiality, Data Availability, and what other attribute comprise the three key attributes of information auditing and monitoring? - ANS - Data integrity. ... What is a first-party cookie? - ANS - A cookie that is set and read by the web server hosting the website the user is visiting. All of the following are considered acceptable methods for U.S.-based multinational transportation companies to achieve compliance with the EU Data Protection Directive except - ANS - Global consent. Which condition must be met to satisfy the Right to Financial Privacy Act requirements for disclosure of individual records by financial institutions? - ANS - The financial records are reasonably described. All of the following are considered acceptable reasons for sharing records of U.S. employees with third parties without obtaining the consent of the employees except - ANS - test marketing the company's new products. According to the EU Data Protection Dirctive, what three elements are essential chracteristics of consent? - ANS - A freely-given, specific and informed indication. Two of the four categories of data protection and privacy law and practices are informational privacy and - ANS - Territorial privacy All of the following are valid privacy protection procedures when terminating an employee who has access to sensitive personal information except - ANS - asking the employee to sign the privacy policy immediately before conducting the exit interview. Which of these elements may be considered personal information? - ANS - Information about a company's leads or prospects. Safe Harbor violations are enforced by the Federal Trade Commission and what other government department? - ANS - The U.S Department of Transportation. What changes did the FISA Amendments Act of 2008 make to the original Foreign Intelligence Surveillance Act of 1978? - ANS - Legal authorization of some new surveillance practices. What is the basis of common law? - ANS - Social customs and expectations. Which country had opted NOT to join the European Economic Area but passed its own omnibus privacy legislation? - ANS - Switzerland. What is NOT a privacy risk raised by the use of smart grid technology? - ANS - Energy use could increase due to continuous monitoring by energy companies. What kind of information security control is an incident response procedure - ANS - Administrative control. Which characteristic completes the following list of the five essential characteristics of cloud computing: on-demand self-service, broad network access, measured service, rapid elasticity and - ANS - Resource pooling. Effective security risk management balances the potential for loss with what cost? - ANS - The cost of security protection and management. Which model is used for privacy protection in the European Union? - ANS - Comprehensive model. Which of the following examples best illustrates the concept of "consumer report" for preemployment screening as defined under the U.S. Fair Credit Reporting Act - ANS - Driving history obtained from an information aggregator. In "phishing" which practices are used to collect personal information? - ANS - Fake e-mails contain links to websites that only appear to be genuine and request personal information. What is provided in Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms? - ANS - The right to respect for an individual's privacy and family life. Which two actions are required under the Fair Credit Reporting Act in order for an employer to obtain a consumer report on a job applicant? - ANS - Obtain applicant's written consent and provide applicant with a copy of the credit report before taking an adverse action. The use of personal information should follow what primary principle? - ANS - Personal information should be limited to the purposes identified in the notice. What is NOT a best practice for organizations managing a social media page? - ANS - Support anonymous positive posts by employees on the organization's social media page to help offset negative posts by customers. All of the following are considered acceptable lines of questioning by U.S. employers to applicants in the preemployment process except - ANS - questions on whether an applicant has applied for or received worker's compensation. For an employer to monitor or intercept electronic mail, which U.S. state requires daily electronic notice? - ANS - Delaware Use of a smart card would be identified as what type of safeguard - ANS - Two-factor authentication. Some states have security breach notification requirements. For those that do, what general information must the breach-of-personally-identifiable-information notification letter to the individual include? - ANS - A brief description of the incident, the type of information involved, and a toll-free number for answers to questions. [Show More]
Last updated: 2 years ago
Preview 1 out of 8 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Oct 05, 2022
Number of pages
8
Written in
This document has been written for:
Uploaded
Oct 05, 2022
Downloads
0
Views
102
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·