
AISB223 Chapter 12: Confidentiality and Privacy Controls
Authored by Farhah Shafiy
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not one of the basic actions that an organization must take to preserve the confidentiality of sensitive information?
Identification of information to be protected.
Backing up the information.
Controlling access to the information.
Training.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After the information that needs to be protected has been identified, what step should be completed next?
The information needs to be placed in a secure, central area.
The information needs to be encrypted.
The information needs to be classified in terms of its value to the organization.
The information needs to be depreciated.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of software blocks outgoing messages containing key words or phrases associated with an organization's sensitive data?
Anti-virus software.
Data loss prevention software.
A digital watermark.
Information rights software.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of software provides an additional layer of protection to sensitive information that is stored in digital format, offering the capability not only to limit access to specific files or documents but also to specify the actions that individuals who are granted access to that resource can perform?
Anti-virus software.
Data loss prevention software.
A digital watermark.
Information rights software.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using
An information rights management software.
A data loss prevention software.
A digital watermark.
A stop leak software.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?
Provide free credit report monitoring for customers.
Inform customers of the option to opt-out of data collection and use of their personal information.
Allow customers' browsers to decline to accept cookies.
Utilize controls to prevent unauthorized access to, and disclosure of, customers' information.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A client approached Paxton Uffe and said, "Paxton, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Paxton responded, "The most effective solution is to implement
A data masking program.
A virtual private network.
A private cloud environment.
An encryption system with digital signatures.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?