Which of the following is MOST important to include in a data use policy?
Correct Answer: A
Explanation A data use policy is a document that defines the rules and guidelines for how personal data are collected, used, stored, shared and deleted by an organization. It is an important part of data governance and compliance, as it helps to ensure that personal data are handled in a lawful, fair and transparent manner, respecting the rights and preferences of data subjects. A data use policy should include the requirements for collecting and using personal data, such as the legal basis, the purpose, the scope, the consent, the data minimization, the accuracy, the security and the accountability. These requirements help to establish the legitimacy and necessity of data processing activities, and to prevent unauthorized or excessive use of personal data. References: * ISACA Privacy Notice & Usage Disclosures, section 2.1: "We collect Personal Information from you when you provide it to us directly or through a third party who has assured us that they have obtained your consent." * Chapter Privacy Policy - Singapore Chapter - ISACA, section 2: "We will collect your personal data in accordance with the PDPA either directly from you or your authorized representatives, and/or through our third party service providers." * Data Minimization-A Practical Approach - ISACA, section 2: "Enterprises may only collect as much data as are necessary for the purposes defined at the time of collection, which may also be set out in a privacy notice (sometimes referred to as a privacy statement, a fair processing statement or a privacy policy)." * Establishing Enterprise Roles for Data Protection - ISACA, section 3: "Data governance is typically implemented in organizations through policies, guidelines, tools and access controls."
Question 2
Transport Layer Security (TLS) provides data integrity through:
Correct Answer: A
Transport Layer Security (TLS) is a protocol that provides secure communication over the internet by encrypting and authenticating data. TLS provides data integrity through the calculation of message digests, which are cryptographic hashes that summarize the content and structure of a message. The sender and the receiver of a message can compare the message digests to verify that the message has not been altered or corrupted during transmission. TLS also uses digital certificates, asymmetric encryption, and symmetric encryption to provide confidentiality and authentication, but these are not directly related to data integrity.
Question 3
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?
Correct Answer: C
Public key infrastructure (PKI) is a system that enables the use of public key cryptography, which is a method of encrypting and authenticating data using a pair of keys: a public key and a private key. Public key cryptography can protect against man-in-the-middle (MITM) attacks, which are attacks where an attacker intercepts and modifies the communication between two parties. PKI makes public key cryptography feasible by providing a way to generate, distribute, verify, and revoke public keys. PKI also uses digital certificates, which are documents that bind a public key to an identity, and certificate authorities, which are trusted entities that issue and validate certificates. By using PKI, the parties can ensure that they are communicating with the intended recipient and that the data has not been tampered with by an attacker. Reference: What is Public Key Infrastructure (PKI)? - Fortinet How is man-in-the-middle attack prevented in TLS? [duplicate] A brief look at Man-in-the-Middle Attacks and the Role of Public Key Infrastructure (PKI)
Question 4
Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?
Correct Answer: C
The first thing to do when a data collection process is deemed to be a high-level risk is to conduct a privacy impact assessment (PIA). A PIA is a systematic process that identifies and evaluates the potential effects of personal data processing operations on the privacy of individuals and the organization. A PIA helps to identify privacy risks and mitigation strategies at an early stage of the data collection process and ensures compliance with legal and regulatory requirements. A PIA also helps to demonstrate accountability and transparency to stakeholders and data subjects regarding how their personal data are collected, used, shared, stored, or deleted. Performing a business impact analysis (BIA), implementing remediation actions to mitigate privacy risk, or creating a system of records notice (SORN) are also important steps for managing privacy risk, but they are not the first thing to do. Performing a BIA is a process of analyzing the potential impacts of disruptive events on the organization's critical functions, processes, resources, or objectives. A BIA helps to determine the recovery priorities, strategies, and objectives for the organization in case of a disaster or crisis. Implementing remediation actions is a process of applying corrective or preventive measures to reduce or eliminate the privacy risks identified by the PIA or other methods. Remediation actions may include technical, organizational, or legal solutions, such as encryption, access control, consent management, or contractual clauses. Creating a SORN is a process of publishing a public notice that describes the existence and purpose of a system of records that contains personal data under the control of a federal agency. A SORN helps to inform the public about how their personal data are collected and maintained by the agency and what rights they have regarding their data.
Question 5
Which of the following is the BEST way to limit the organization's potential exposure in the event of consumer data loss while maintaining the traceability of the data?
Correct Answer: B
Explanation De-identification is a technique that removes or modifies direct and indirect identifiers in a data set to prevent or limit the identification of the data subjects. De-identification reduces the risk of re-identification and thus limits the organization's potential exposure in the event of consumer data loss. De-identification also maintains the traceability of the data by preserving some characteristics or patterns of the original data that can be used for analysis or research purposes. The other options are not effective ways to limit exposure and maintain traceability1, p. 75-76 References: 1: CDPSE Review Manual (Digital Version)