Search Header Logo

AISB223 Chapter 12: Confidentiality and Privacy Controls

Authored by Farhah Shafiy

Information Technology (IT)

University

Used 3+ times

AISB223 Chapter 12: Confidentiality and Privacy Controls
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the basic actions that an organization must take to preserve the confidentiality of sensitive information?

Identification of information to be protected.

Backing up the information.

Controlling access to the information.

Training.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After the information that needs to be protected has been identified, what step should be completed next?

The information needs to be placed in a secure, central area.

The information needs to be encrypted.

The information needs to be classified in terms of its value to the organization.

The information needs to be depreciated.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software blocks outgoing messages containing key words or phrases associated with an organization's sensitive data?

Anti-virus software.

Data loss prevention software.

A digital watermark.

Information rights software.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of software provides an additional layer of protection to sensitive information that is stored in digital format, offering the capability not only to limit access to specific files or documents but also to specify the actions that individuals who are granted access to that resource can perform?

Anti-virus software.

Data loss prevention software.

A digital watermark.

Information rights software.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using

An information rights management software.

A data loss prevention software.

A digital watermark.

A stop leak software.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

Provide free credit report monitoring for customers.

Inform customers of the option to opt-out of data collection and use of their personal information.

Allow customers' browsers to decline to accept cookies.

Utilize controls to prevent unauthorized access to, and disclosure of, customers' information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A client approached Paxton Uffe and said, "Paxton, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Paxton responded, "The most effective solution is to implement

A data masking program.

A virtual private network.

A private cloud environment.

An encryption system with digital signatures.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?