Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

IAPP-CIPT Study Guide With A+ 2022

Beoordeling
-
Verkocht
-
Pagina's
68
Cijfer
A+
Geüpload op
30-03-2025
Geschreven in
2024/2025

IAPP-CIPT Study Guide With A+ 2022

Instelling
Vak

Voorbeeld van de inhoud

,IAPP-CIPT Study Guide With A+ 2022

"Client side" Privacy Risk - (ANSWER)- Represents computers typically used by company employees.

- These computers normally connect to the company's server-side systems via wireless and hardwired
networks.

- Client side can represent a significant threat to the company's systems as well as sensitive data that
may be on the client computers.

- Employees often download customer files, corporate e-mails and legal documents to their computer
for processing.

- Employees may even store their personal information on company computers.

- Client computer can access resources across the company that could have vast amounts of planning
documents that might be of great interest to competitors or corporate spies.



Network Sniffer - (ANSWER)- Allows anyone to view or copy unprotected data from a company's
wireless network.



.



/P:count flag - (ANSWER)Format command within Windows OS. Best way to zero the entire disk.



cross-enterprise access controls - (ANSWER)Permits employees in one organization to have access to
resources that belong to another organization. Typical when major functions are outsourced or
through SAAS model. Travel, purchasing, payroll, and healthcare could be provided by companies that
specialize in those services. CEAC allows employees to access records through SSO. Access is typically
one-way.



SSL encryption - (ANSWER)secure socket layer protocol commonly used to protect communications
between a browser and web machine (data in transit)



TSL encryption - (ANSWER)transport layer security often used to protect email as it is transmitted
between email servers (data in transit)



multilayered privacy notice - (ANSWER)abbreviated form of an organization's privacy notice while
providing links to more detailed information

,privacy nutrition label - (ANSWER)informs users about the company's privacy practices of the
organization in an abbreviated form -- only practical as part company's privacy notice or as a privacy
notice for a newly installed applications.



hashing - (ANSWER)method of protecting data that uses a cryptographic key to encrypt the data but
does not allow the data to later be decrypted. Permits the use of sensitive data while protecting the
original value. Permits the encryption of passwords, credit card numbers, and SSNs while still
permitting the verification of values by matching hashes. (Ex: a credit card number can be hashed and
used as index for an individual's credit card transactions while preventing the hashed value from being
used for additional transactions. Salting, which shifts the encryption value, can also be used. Secure
Hashing Algorithm 1 (SHA-1) and Rivest Cypher 4 (RC4) are examples of hashing algorithms.



types of authentication (KHAW) - (ANSWER)"What you know" - this type of authentication involves
something the user knows, usually an ID and password.



"Something you have" - this type of authentication involves something the user carries on her person,
usually an RSA or key fob.



"Something you are" - This involves biometrics to authenticate, such as a fingerprint or retinal scan.



"Where you are" - This type of authentication involves confirmation of the user's location.



multifactor authentication - (ANSWER)when more than one type of authentication is used to validate
an individual. KHAW:



Device Identifier - (ANSWER)Device ID assigned by the device manufacturer or operating system
vendor which can be a source for user tracking as Device ID's are often not deleted, blocked, or opted
out of. Device ID, media access control (MAC) or other device-assigned ID's are TO BE AVOIDED by
developers as these device identifiers may be used to track employees.



Whaling - (ANSWER)Email targeting of wealthy individuals.



Development Lifecycle - (ANSWER)Release Planning

, Definition

Development

Validation

Deployment



Countermeasures - (ANSWER)1. Preventative - These work by keeping something from happening in
the first place. Examples: security awareness training, firewall, anti-virus, security guard and Intrusion
Prevention System (IPS).

2. Reactive - Reactive countermeasures come into effect only after an event has already occurred.

3. Detective - Examples of detective counter measures include: system monitoring, Intrusion Detection
System (IDS), anti-virus, motion detectors and IPS.

4. Administrative - These controls are the process of developing and ensuring compliance with policy
and procedures. These use policy to protect an asset.



Stages of PCI DDS Compliance - (ANSWER)1. Collecting and storing - Security collection and tamper-
proof storage of log data so its available for analysis.

2. Reporting - Ability to provide compliance during audit. Organization should show evidence that data
protection controls are in place.

3. Monitoring and Alerting - Implementing systems to enable administrators to monitor access and
usage of data.



Also known as Assess, Remediate, Report



Re-identification - (ANSWER)The act of identifying someone who was previously not identified or was
de-identified.



Symmetric key cryptography - (ANSWER)Protects data at rest. Using the same key for encrypting as
well as decrypting. It is also referred to as shared secret, secret-key or private key. This key is not
distributed, rather is kept secret by the sending and receiving parties. Safe distribution of key is
difficult. More practical for large blocks and data shared with multiple people. Symmetric encryption
performs faster than asymmetric encryption and requires smaller key for same level of protection. DES
and AES are examples of symmetric encryption.

Geschreven voor

Vak

Documentinformatie

Geüpload op
30 maart 2025
Aantal pagina's
68
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
AllRoundStudyHub Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2834
Lid sinds
1 jaar
Aantal volgers
24
Documenten
1759
Laatst verkocht
3 dagen geleden
All-Round Study Hub

As a tutor, I focus on offering accurate, reliable, and current study materials to support students in their exam preparation and assignments. My goal is to provide the best resources, such as summaries and nursing exam test banks, ensuring that students can buy with confidence. I encourage customers to leave reviews after purchases for quality assurance and to recommend my services to others. Thank you for your support and trust.

3.6

79 beoordelingen

5
32
4
13
3
18
2
3
1
13

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen