1.
What is a description of Privacy by Design?
-
a principle advocating for privacy to be intentionally embedded into the design and architecture of IT systems and business practices
-
a principle focusing on the technical aspects of implementing data protection controls, such as encryption and anonymization
-
a principle focusing only on data storage and management by third-party providers
-
a principle that is reactive to data protection and is only considered after a data breach has occurred
2
.
The General Data Protection Regulation (GDPR) impacts ________.
-
only organizations based in the EU
-
only organizations based outside of the EU
-
all organizations that process the data of EU citizens, regardless of the company’s location
-
only organizations that have a physical presence in the EU
3.
The International Organization for Standardization’s (ISO) 27701 standard is an extension of ISO 27001. What does ISO 27701 provide guidance on?
-
how to manage privacy information
-
how to manage third-party relationships in data storage
-
how to create new data privacy laws
-
how to design privacy into IT systems and business practices
4
.
How did internet usage change from the 1990s to the 2020s?
-
It decreased due to privacy concerns.
-
It increased slightly with the growth of technology.
-
It skyrocketed due to the rise of big data and digital lifestyle.
-
It remained stable as internet penetration rates reached a plateau.
5.
What is the term for the practice of incorporating privacy controls into the design and development of IT, systems, networks, and business practices?
-
Privacy by Design
-
privacy engineering
-
security engineering
-
privacy network
6
.
What kind of attack exploits vulnerabilities in a web application to inject malicious scripts into websites viewed by other users?
-
man-in-the-middle attack
-
SQL injection
-
cross-site scripting
-
phishing
7.
Which attack can turn unsecured IoT devices into bots to carry out massive, distributed denial-of-service (DDoS) attacks?
-
Mirai botnet attack
-
SQL injection
-
CSRF attack
-
dictionary attack
8
.
Which international standard provides a framework for an information security management system (ISMS)?
-
ISO 31000
-
ISO/IEC 27001
-
ISO 9001
-
ISO 14001
9.
When developing web and IoT technologies, enterprises and IT professionals have the social responsibility to ________.
-
maximize profit
-
ensure user engagement
-
safeguard user information and privacy
-
minimize development costs
10
.
Which regulation enacted by the European Union focuses primarily on data protection and control?
-
COPPA
-
GDPR
-
CCPA
-
LGPD
11.
Which organization has been heavily involved in developing standards specifically for IoT?
-
W3C
-
IEEE
-
ITU
-
NIST
12
.
In the case study, what was the primary reason behind the Texas-based data center efforts to gain ISO/IEC 27001 certification?
-
legal requirement
-
client demands
-
strategic business decision
-
government grants
13.
Which type of organization would most likely require that its data centers be ISO/IEC 27001 certified?
-
local shops
-
Fortune 500 companies
-
small online businesses
-
individual clients
14
.
What is a primary focus of a gap analysis related to data security and privacy?
-
identifying strong performance areas only
-
assessing whether the organization’s philanthropic efforts are successful
-
comparing current policies against industry standards to identify weaknesses
-
measuring the CEO’s leadership skills
15.
In terms of compliance with global frameworks such as GDPR, what principle emphasizes collecting only the data strictly necessary for intended purposes?
-
data maximization
-
transparency
-
data minimization
-
data expansion
16
.
What is the main objective of conducting an audit in the context of data security and privacy?
-
to hire new staff
-
to align an organization’s practices with global privacy standards
-
to redesign the company’s organizational structure
-
to evaluate employee performance
17.
In complying with global frameworks such as GDPR, what does the term transparency primarily refer to?
-
the organization’s revenue
-
clarity in how user data are used and managed
-
the physical layout of an office
-
government operations
18
.
Which of the following would be considered a significant risk associated with gaps in data security policies?
-
reduced employee turnover
-
increased stock prices
-
loss of user trust and potential regulatory fines
-
introduction of new company products
19.
The scope of a gap analysis for data security and privacy usually includes evaluating ________.
-
employee behavior and data sharing controls
-
third-party data access and customer behavior
-
evaluating areas such as user consent management, data sharing controls, and third-party data access
-
consent management only