Free CIPM Exam Braindumps (page: 22)

Page 22 of 54

SCENARIO:
Please use the following to answer the next question:

Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.

One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.

Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.

If this were a data breach, how is it likely to be categorized?

  1. Availability Breach.
  2. Authenticity Breach.
  3. Confidentiality Breach.
  4. Integrity Breach.

Answer(s): C



SCENARIO:
Please use the following to answer the next question:

Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.

One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.

Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.

Going forward, what is the best way for IgNight to prepare its IT team to manage these kind of security events?

  1. Tabletop exercises.
  2. Update its data inventory.
  3. IT security awareness training.
  4. Share communications relating to scheduled maintenance.

Answer(s): A



Which of the following is NOT typically a function of a Privacy Officer?

  1. Managing an organization's information security infrastructure.
  2. Serving as an interdepartmental liaison for privacy concerns.
  3. Monitoring an organization's compliance with privacy laws.
  4. Responding to information access requests from the public.

Answer(s): D



What is the main reason to begin with 3-5 key metrics during the program development process?

  1. To avoid undue financial costs.
  2. To keep the focus on the main organizational objectives.
  3. To minimize selective data use.
  4. To keep the process limited to as few people as possible.

Answer(s): C



Page 22 of 54



Post your Comments and Discuss IAPP CIPM exam with other Community members:

Thato Mohutsi commented on August 20, 2024
Great Questions
Anonymous
upvote