Question 61
Following aspects can serve as inputs to a privacy organization for ensuring privacy protection:
I) Privacy related incidents detected/reported
II) Contractual obligations
III) Organization's exposure to personal information
IV) Regulatory requirements
I) Privacy related incidents detected/reported
II) Contractual obligations
III) Organization's exposure to personal information
IV) Regulatory requirements
Question 62
From the following list, identify the technology aspects that are specially designed for upholding privacy:
I) Data minimization
II) Intrusion prevention system
III) Data scrambling
IV) Data loss prevention
V) Data portability
VI) Data obfuscation
VII) Data encryption
VIII) Data mirroring
I) Data minimization
II) Intrusion prevention system
III) Data scrambling
IV) Data loss prevention
V) Data portability
VI) Data obfuscation
VII) Data encryption
VIII) Data mirroring
Question 63
Categorize the following statement:
"The network is unable to restrict unwanted external connections carrying sensitive information."
"The network is unable to restrict unwanted external connections carrying sensitive information."
Question 64
Which of the following is not an appropriate privacy principle?
L Collection limitation
ii Collection limitation
in Notice
iv. Consent
v Access & correction
VI. Data usage
L Collection limitation
ii Collection limitation
in Notice
iv. Consent
v Access & correction
VI. Data usage
