Privacy in the Modern Era

Privacy in the Modern Era

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

21 Qs

Google Cloud Digital Leader - common knowledge sort of

Google Cloud Digital Leader - common knowledge sort of

Professional Development

15 Qs

GCP-FOUND4

GCP-FOUND4

Professional Development

20 Qs

Social Media Basics for Educators

Social Media Basics for Educators

9th Grade - Professional Development

15 Qs

Sec+ Quiz - 1

Sec+ Quiz - 1

Professional Development

15 Qs

Linkedin CyberSec Test

Linkedin CyberSec Test

Professional Development

20 Qs

Cyber security and Data protection Test

Cyber security and Data protection Test

Professional Development

20 Qs

A+ - 10A - Configure Windows User Settings

A+ - 10A - Configure Windows User Settings

Professional Development

20 Qs

Privacy in the Modern Era

Privacy in the Modern Era

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Bob Riley

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following types of information should be protected by a privacy program?

Customer records

Product plans

Trade secrets

All of the above

Answer explanation

All of these records are important to a business and may be considered sensitive. However, this does not mean that they would fall into the scope of a privacy program. Privacy programs are specifically intended to protect personal information and, of the information presented here, only customer records fall into that category. A cybersecurity program would be interested in protecting all these elements of information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Barry is consulting with his organization's cybersecurity team on the development of their cybersecurity program. Which one of the following would not be a typical objective of such a program?

  1. Privacy

  1. Confidentiality

  1. Availability

  1. Integrity

Answer explanation

The three main goals of a cybersecurity program are confidentiality, integrity, and availability. Although privacy and security objectives are often linked and interdependent, privacy is not one of the three cybersecurity objectives.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Howard is assisting his firm in developing a new privacy program and wants to incorporate a privacy risk assessment process into the program. If Howard wishes to comply with industry best practices, how often should the firm conduct these risk assessments?

  1. Monthly

  1. Semiannually

  1. Annually

  1. Biannually

Answer explanation

  1. Industry best practice calls for an annual privacy risk assessment designed to analyze the organization's current practices in light of the evolving privacy environment.


4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Of the following fields, which fits into the "special categories of personal data" under GDPR?

  1. Banking records

  1. Union membership records

  1. Educational records

  1. Employment records

Answer explanation

The special categories of information under GDPR include information about racial and ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic information, biometric information, health data, and data about a person's sex life or sexual orientation. Other categories of information may be sensitive but do not fit into this definition.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Katie is assessing her organization's privacy practices and determines that the organization previously collected customer addresses for the purpose of shipping goods and is now using those addresses to mail promotional materials. If this possibility was not previously disclosed, what privacy principle is the organization most likely violating?

  1. Quality

  1. Management

  1. Notice

  1. Security

Answer explanation

One of the provisions of the notice principle is that organizations should provide notice to data subjects before they use information for a purpose other than those that were previously disclosed.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Kara is the chief privacy officer of an organization that maintains a database of customer information for marketing purposes. What term best describes the role of Kara's organization with respect to that database?

  1. Data subject

  1. Data custodian

  1. Data controller

  1. Data processor

Answer explanation

  1. Kara's organization is collecting and processing this information for its own business needs. Therefore, it is best described as the data controller.


7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Richard would like to use an industry standard reference for designing his organization's privacy controls. Which one of the following ISO standards is best suited for this purpose?

  1. ISO 27001

  1. ISO 27002

  1. ISO 27701

  1. ISO 27702

Answer explanation

ISO 27701 covers best practices for implementing privacy controls. ISO 27001 and ISO 27002 relate to an organization's information security program. ISO 27702 does not yet exist.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?