Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIPT - Certified Information Privacy Technologist EXAM 2022

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
29-09-2022
Geschreven in
2022/2023

Development Lifecycle Release Planning Definition Development Validation Deployment There are four basic types of countermeasures 1. Preventative - These work by keeping something from happening in the first place. Examples of this include: security awareness training, firewall, anti-virus, security guard and IPS. 2. Reactive - Reactive countermeasures come into effect only after an event has already occurred. 3. Detective - Examples of detective counter measures include: system monitoring, IDS, anti-virus, motion detectors and IPS. 4. Administrative - These controls are the process of developing and ensuring compliance with policy and procedures. These use policy to protect an asset. PCI DSS has three main stages of compliance Collecting and Storing - This involves the secure collection and tamper-proof storage of log data so that it is available for analysis. Reporting - This is the ability to prove compliance should an audit arise. The organization should also show evidence that data protection controls are in place. Monitoring and Alerting - This involves implementing systems to enable administrators to monitor access and usage of data. There should also be evidence that log data is being collected and stored. Re-Identification re-identification refers to using data from a single entity holding the data. Symmetric Encryption Symmetric key cryptography refers to using the same key for encrypting as well as decrypting. It is also referred to as shared secret, secret-key or private key. This key is not distributed, rather is kept secret by the sending and receiving parties Asymmetric Encryption Asymmetric cryptography is also referred to as public-key cryptography. Public key depends on a key pair for the processes of encryption and decryption. Unlike private keys, public keys are distributed freely and publicly. Data that has been encrypted with a public key can only be decrypted with a private key.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CIPT - Certified Information Privacy
Technologist

Development Lifecycle correct answerRelease Planning

Definition

Development

Validation

Deployment



There are four basic types of countermeasures correct answer1. Preventative - These work by keeping
something from happening in the

first place. Examples of this include: security awareness training, firewall,

anti-virus, security guard and IPS.

2. Reactive - Reactive countermeasures come into effect only after an event

has already occurred.

3. Detective - Examples of detective counter measures include: system

monitoring, IDS, anti-virus, motion detectors and IPS.

4. Administrative - These controls are the process of developing and

ensuring compliance with policy and procedures. These use policy to

protect an asset.



PCI DSS has three main stages of compliance correct answerCollecting and Storing - This involves the
secure collection and tamper-proof storage

of log data so that it is available for analysis.

Reporting - This is the ability to prove compliance should an audit arise. The

, organization should also show evidence that data protection controls are in place.

Monitoring and Alerting - This involves implementing systems to enable

administrators to monitor access and usage of data. There should also be evidence that

log data is being collected and stored.



Re-Identification correct answerre-identification refers to using data from a single entity holding the
data.



Symmetric Encryption correct answerSymmetric key cryptography refers to using the same key for
encrypting as well as

decrypting. It is also referred to as shared secret, secret-key or private key. This key is

not distributed, rather is kept secret by the sending and receiving parties



Asymmetric Encryption correct answerAsymmetric cryptography is also referred to as public-key
cryptography. Public key

depends on a key pair for the processes of encryption and decryption. Unlike private

keys, public keys are distributed freely and publicly. Data that has been encrypted with a

public key can only be decrypted with a private key.



Choice/Consent correct answerOpt-in = requires affirmative consent of individual

Opt-out = requires implicit consent of individual

Mandatory data collection - necessary to complete the immediate transaction (vs.

optional data collection, which will not prevent the transaction from being completed)

Choice and consent are regulated by CAN-SPAM Act of 2003, European Data Directive

(Articles 7 and 8

Geschreven voor

Vak

Documentinformatie

Geüpload op
29 september 2022
Aantal pagina's
9
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$8.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMCOLLECTIVES Herzing University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1774
Lid sinds
4 jaar
Aantal volgers
1159
Documenten
23358
Laatst verkocht
4 dagen geleden
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Lees meer Lees minder
4.1

446 beoordelingen

5
252
4
57
3
84
2
18
1
35

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen