2 cissp ® Official Study Guide Eighth Edition


C. Identifying appropriate use and protection of data D



Download 19,3 Mb.
Pdf ko'rish
bet193/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   189   190   191   192   193   194   195   196   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

C.
Identifying appropriate use and protection of data
D.
Applying security controls to a system
15.
Within the context of the EU GDPR, what is a data processor?
A.
The entity that processes personal data on behalf of the data controller
B.
The entity that controls processing of data
C.
The computing system that processes data
D.
The network that processes data
16.
Your organization has a large database of customer data. To comply with the EU GDPR, 
administrators plan to use pseudonymization. Which of the following 
best
describes 
pseudonymization?
A.
The process of replacing some data with another identifier
B.
The process of removing all personal data
C.
The process of encrypting data
D.
The process of storing data
17.
An organization is implementing a preselected baseline of security controls, but finds that 
some of the controls aren’t relevant to their needs. What should they do?
A.
Implement all the controls anyway.
B.
Identify another baseline.
C.
Re-create a baseline.
D.
Tailor the baseline to their needs.
Refer the following scenario when answering questions 18 through 20.
An organization has a datacenter that processes highly sensitive information and is staffed 
24 hours a day. The datacenter includes email servers, and administrators purge email older 
than six months to comply with the organization’s security policy. Access to the datacenter 
is controlled, and all systems that process sensitive information are marked. Administrators 
routinely back up data processed in the datacenter. They keep a copy of the backups on 
site and send an unmarked copy to one of the company warehouses. Warehouse workers 


Review Questions 
193
organize the media by date, and they have backups from the last 20 years. Employees work 
at the warehouse during the day and lock it when they leave at night and over the weekends. 
Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes. Later, 
copies of their data, including sensitive emails from years ago, began appearing on internet 
sites, exposing the organization’s internal sensitive data.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   189   190   191   192   193   194   195   196   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish