100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

IAPP-CIPT EXAM QUESTIONS AND ANSWERS 100% CORRECT

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
27-11-2024
Written in
2024/2025

IAPP-CIPT EXAM QUESTIONS AND ANSWERS 100% CORRECTIAPP-CIPT EXAM QUESTIONS AND ANSWERS 100% CORRECTIAPP-CIPT EXAM QUESTIONS AND ANSWERS 100% CORRECTIAPP-CIPT EXAM QUESTIONS AND ANSWERS 100% CORRECT "Client side" Privacy Risk - ANSWER-- Represents computers typically used by company employees. - These computers normally connect to the company's server-side systems via wireless and hardwired networks. - Client side can represent a significant threat to the company's systems as well as sensitive data that may be on the client computers. - Employees often download customer files, corporate e-mails and legal documents to their computer for processing. - Employees may even store their personal information on company computers. - Client computer can access resources across the company that could have vast amounts of planning documents that might be of great interest to competitors or corporate spies. Network Sniffer - ANSWER-- Allows anyone to view or copy unprotected data from a company's wireless network. . /P:count flag - ANSWER-Format command within Windows OS. Best way to zero the entire disk. cross-enterprise access controls - ANSWER-Permits employees in one organization to have access to resources that belong to another organization. Typical when major

Show more Read less
Institution
IAPP-CIPT
Course
IAPP-CIPT









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IAPP-CIPT
Course
IAPP-CIPT

Document information

Uploaded on
November 27, 2024
Number of pages
12
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

IAPP-CIPT EXAM QUESTIONS AND
ANSWERS 100% CORRECT
"Client side" Privacy Risk - ANSWER-- Represents computers typically used by
company employees.
- These computers normally connect to the company's server-side systems via wireless
and hardwired networks.
- Client side can represent a significant threat to the company's systems as well as
sensitive data that may be on the client computers.
- Employees often download customer files, corporate e-mails and legal documents to
their computer for processing.
- Employees may even store their personal information on company computers.
- Client computer can access resources across the company that could have vast
amounts of planning documents that might be of great interest to competitors or
corporate spies.

Network Sniffer - ANSWER-- Allows anyone to view or copy unprotected data from a
company's wireless network.

.

/P:count flag - ANSWER-Format command within Windows OS. Best way to zero the
entire disk.

cross-enterprise access controls - ANSWER-Permits employees in one organization to
have access to resources that belong to another organization. Typical when major
functions are outsourced or through SAAS model. Travel, purchasing, payroll, and
healthcare could be provided by companies that specialize in those services. CEAC
allows employees to access records through SSO. Access is typically one-way.

SSL encryption - ANSWER-secure socket layer protocol commonly used to protect
communications between a browser and web machine (data in transit)

TSL encryption - ANSWER-transport layer security often used to protect email as it is
transmitted between email servers (data in transit)

multilayered privacy notice - ANSWER-abbreviated form of an organization's privacy
notice while providing links to more detailed information

privacy nutrition label - ANSWER-informs users about the company's privacy practices
of the organization in an abbreviated form -- only practical as part company's privacy
notice or as a privacy notice for a newly installed applications.

, hashing - ANSWER-method of protecting data that uses a cryptographic key to encrypt
the data but does not allow the data to later be decrypted. Permits the use of sensitive
data while protecting the original value. Permits the encryption of passwords, credit card
numbers, and SSNs while still permitting the verification of values by matching hashes.
(Ex: a credit card number can be hashed and used as index for an individual's credit
card transactions while preventing the hashed value from being used for additional
transactions. Salting, which shifts the encryption value, can also be used. Secure
Hashing Algorithm 1 (SHA-1) and Rivest Cypher 4 (RC4) are examples of hashing
algorithms.

types of authentication (KHAW) - ANSWER-"What you know" - this type of
authentication involves something the user knows, usually an ID and password.

"Something you have" - this type of authentication involves something the user carries
on her person, usually an RSA or key fob.

"Something you are" - This involves biometrics to authenticate, such as a fingerprint or
retinal scan.

"Where you are" - This type of authentication involves confirmation of the user's
location.

multifactor authentication - ANSWER-when more than one type of authentication is
used to validate an individual. KHAW:

Device Identifier - ANSWER-Device ID assigned by the device manufacturer or
operating system vendor which can be a source for user tracking as Device ID's are
often not deleted, blocked, or opted out of. Device ID, media access control (MAC) or
other device-assigned ID's are TO BE AVOIDED by developers as these device
identifiers may be used to track employees.

Whaling - ANSWER-Email targeting of wealthy individuals.

Development Lifecycle - ANSWER-Release Planning
Definition
Development
Validation
Deployment

Countermeasures - ANSWER-1. Preventative - These work by keeping something from
happening in the first place. Examples: security awareness training, firewall, anti-virus,
security guard and Intrusion Prevention System (IPS).
2. Reactive - Reactive countermeasures come into effect only after an event has
already occurred.
3. Detective - Examples of detective counter measures include: system monitoring,
Intrusion Detection System (IDS), anti-virus, motion detectors and IPS.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1619
Member since
2 year
Number of followers
1073
Documents
18045
Last sold
17 hours ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

442 reviews

5
210
4
76
3
87
2
21
1
48

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions