AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

quiz-placeholder

Similar activities

Python_MCQ_2

Python_MCQ_2

University

15 Qs

STP_Integrasi aplikasi

STP_Integrasi aplikasi

9th Grade - University

15 Qs

P3 IAS 2 Quiz

P3 IAS 2 Quiz

University

15 Qs

Quiz Administrasi Perkantoran

Quiz Administrasi Perkantoran

9th Grade - University

20 Qs

ICT G7 Chapter 2.2 Direct Data Entry Devices

ICT G7 Chapter 2.2 Direct Data Entry Devices

7th Grade - University

15 Qs

Getting Familiar with GIT and GITHUB

Getting Familiar with GIT and GITHUB

University

15 Qs

SI vesus TI

SI vesus TI

University

20 Qs

Building Information Modelling (BIM) Quiz

Building Information Modelling (BIM) Quiz

University

20 Qs

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Farhah Shafiy

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the basic actions that an organization must take to preserve the confidentiality of sensitive information?

Identification of information to be protected.

Backing up the information.

Controlling access to the information.

Training.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After the information that needs to be protected has been identified, what step should be completed next?

The information needs to be placed in a secure, central area.

The information needs to be encrypted.

The information needs to be classified in terms of its value to the organization.

The information needs to be depreciated.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software blocks outgoing messages containing key words or phrases associated with an organization's sensitive data?

Anti-virus software.

Data loss prevention software.

A digital watermark.

Information rights software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software provides an additional layer of protection to sensitive information that is stored in digital format, offering the capability not only to limit access to specific files or documents but also to specify the actions that individuals who are granted access to that resource can perform?

Anti-virus software.

Data loss prevention software.

A digital watermark.

Information rights software.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using

An information rights management software.

A data loss prevention software.

A digital watermark.

A stop leak software.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

Provide free credit report monitoring for customers.

Inform customers of the option to opt-out of data collection and use of their personal information.

Allow customers' browsers to decline to accept cookies.

Utilize controls to prevent unauthorized access to, and disclosure of, customers' information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client approached Paxton Uffe and said, "Paxton, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Paxton responded, "The most effective solution is to implement

A data masking program.

A virtual private network.

A private cloud environment.

An encryption system with digital signatures.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?