100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)

Puntuación
-
Vendido
-
Páginas
16
Grado
A+
Subido en
27-11-2024
Escrito en
2024/2025

CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)CIPT EXAM QUESTIONS AND ANSWERS (GRADED A) Bastion Server - ANSWER-A server that has 1 purpose and only contains software to support that purpose. E.g. Printer, email, and database servers are bastion servers. Using bastion servers reduces the number of applications on a server, which minimizes vulnerability. Privacy Impact Assessment (PIA) - ANSWER-Checklists or tools to ensure that a personal information system is evaluated for privacy risks and designed with life cycle principles in mind. An effective PIA evaluates the sufficiency of privacy practices and policies with respect to legal, regulatory and industry standards, and maintains consistency between policy and practice. Should be conducted annually, or additionally upon occurrence of any of the following events:

Mostrar más Leer menos
Institución
CIPT
Grado
CIPT










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CIPT
Grado
CIPT

Información del documento

Subido en
27 de noviembre de 2024
Número de páginas
16
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CIPT EXAM QUESTIONS AND ANSWERS
(GRADED A)
Bastion Server - ANSWER-A server that has 1 purpose and only contains software to
support that purpose.

E.g. Printer, email, and database servers are bastion servers.

Using bastion servers reduces the number of applications on a server, which minimizes
vulnerability.

Privacy Impact Assessment (PIA) - ANSWER-Checklists or tools to ensure that a
personal information system is evaluated for privacy risks and designed with life cycle
principles in mind. An effective PIA evaluates the sufficiency of privacy practices and
policies with respect to legal, regulatory and industry standards, and maintains
consistency between policy and practice.

Should be conducted annually, or additionally upon occurrence of any of the following
events:
-Creation of new product/service
-New/updated program for processing data
-Merger/acquisition
-Creation of new data center
-Onboarding of new data
-Movement of data to different country
-Changes in regulations governing data use

Security Policy Principles - ANSWER-All security policies should include these
EXTERNAL requirements:
(1) Corporate - data stored from consumers, partners, vendors, and employees needs
to be protected in accordance with contracts or privacy policies; also, need to keep data
secure to protect interests.
(2) Regulatory - privacy requirements placed on organizations by government entities
(e.g. FTC, Office of the Information and Privacy Commissioner of Ontario, and the UK
Information Commissioner's Office).
(3) Industry - compliance with different industry groups shows commitment to privacy
principles of that industry, which can avoid creation of new legislation / regulatory
scrutiny.

Industry Groups - ANSWER-Industry group examples = Better Business Bureau,
Interactive Advertising Bureau, TRUSTe, and the Entertainment Software Rating Board.

,Key Security Measures - ANSWER-(1) Encryption - BEST means of protecting data
during transmission and storage; type of encryption should be based on how the
encryption's performance and complexity may impact company system.
(2) Software protection - antivirus software can detect malicious software; packet
filtering can help ensure inappropriate communications packets do not make it onto
company's network.
(3) Access controls - programmatic means for preventing unwanted access to data
hosted; should be continually certified to ensure only appropriate people have access.
(4) Physical protection - all computers should have minimum level of physical security to
prevent outside access (e.g. cameras, guards).
(5) Social engineering prevention - employees should. be trained to detect exploits
where individuals pretend to represent company/person in order to gain access to data.
(ChoicePoint data breach)
(6) Auditing - auditing system should be configured so logs are sent to remote auditing
machine outside the control of the system and application administrators.

Steps for avoiding privacy-invasive applications - ANSWER-(1) Privileged access -
restrictions can be placed on who installs/configures applications;
(2) Software policy - policy that describes requirements/guidelines for applications used
on company computers.
(3) Policy links - for each application that explains privacy obligation and is accessible
via application.
(4) Application research - companies should perform research to determine which
applications are most appropriate for their employees, computers, and networks.
(5) Employee training - employees should be periodically trained on company's software
policy, as well as on threats to privacy from installation of malicious
applications/improper configuration of legitimate apps; yearly privacy training is best
practice.
(5) IT involvement - can have one of two ways: (i) IT controlled - IT dept sets up each
computer, ensuring only specific apps are installed and ensuring apps are periodically
updated as needed or (ii) IT monitored - company computers can be periodically
scanned to validate each installed application is on approved list of apps and has right
version/proper configuration set.
(6) Employee Controlled - companies can let employees manage own computer system
based on corporate policy, as opposed to IT dept governance.

Ways to mitigate network risks - ANSWER-(1) Keep computers clear of malware - run
latest anti-malware software;
(2) Apply smartphone policies - phone passwords, auto-device lock/remote wiping
mechanism enforced for smartphones connecting to network resources;
(3) Validate network devices - each device must come from reputable vendor and have
proper configuration/most recent updates;
(4) Write secure code - developers should follow guidelines on how to write software
that avoids the risk of exposing data over network ("Writing Secure Code" and "The
Open Web Application Security Project");

, (5) Validate applications - all apps running on computers/smartphones should be
restricted from accessing network services unless they are on a safe list set up by IT
dept.
(6) Network encryption - use encryption on wireless/wired networks at transportation
level to mitigate threat of thieves accessing unprotected data.

Network Monitoring - ANSWER-Malware can infect company's network and travel from
computer to computer. Network monitoring software can look for known virus signatures
or use other means to find and cleanse network infestations.

Network monitoring can also prevent private data from leaving company / look for
signatureless advanced malware and take targeted actions.

Hashing - ANSWER-Uses cryptographic key to encrypt data but does not allow data to
be later decrypted - permits use of sensitive data while protecting original value.

Used for credit card numbers or SSN. The downside is that the information can never
be decrypted.

Password control - ANSWER-Single Sign On (SSO) can permit access to multiple
resources from a single account, with ability to centrally lock a person to multiple
resources.

Machine access restriction - ANSWER-Limit access to a computer based on computer
identifier or IP address.

Example: Access to payroll database only limited to set of computers in payroll
department.

Enterprise Architecture (EA) - ANSWER-EA involves managing data flow across an
organization to reduce risk and support business growth.
---Data flow diagram can show origin of data, indicating whether origin was an
individual, external entity, internal group or process.

Data Storage - ANSWER-(1) Files - can be protected outside of their storage system
using password-based encryption or digital rights management;
(2) Websites - Employee access should be limited, and each website should have a
policy link for employees/access control list/organized by category to protect sensitive
content.
(3) Databases - good place to store sensitive data because general access control, role-
based access control, encryption, data categorization, retention management, and
auditing.
(4) Cloud storage - provides better access to data for customers, lower operational
costs, and limits regulatory risks for cross-border transfer of customer data. Contracts
should ensure that the hosting company follows org's data storage policy.
$15.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
NursingTutor1 West Virginia University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1642
Miembro desde
3 año
Número de seguidores
1073
Documentos
18066
Última venta
1 día hace
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.8

449 reseñas

5
212
4
76
3
90
2
21
1
50

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes