- (Exam Topic 1)
What must be secured on physical hardware to prevent unauthorized access to systems?
Correct Answer:
A
BIOS is the firmware that governs the physical initiation and boot up of a piece of hardware. If it is compromised, an attacker could have access to hosted systems and make configurations changes to expose or disable some security elements on the system.
- (Exam Topic 4)
Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?
Correct Answer:
C
Whereas IRM is used to protect a broad range of data, DRM is focused specifically on the protection of consumer media, such as publications, music, movies, and so on. IRM is used to protect general institution data, so financial records, personnel data, and security profiles would all fall under the auspices of IRM.
- (Exam Topic 4)
All the following are data analytics modes, except:
Correct Answer:
C
All the others are data analytics methods, but “refractory iterations” is a nonsense term thrown in as a red
herring.
- (Exam Topic 2)
The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?
Correct Answer:
C
Adopted in 1995, Directive 95/46 EC establishes strong data protection and policy requirements, including the declaring of data privacy to be a human right. It establishes that an individual has the right to be notified when their personal data is being access or processed, that it only will ever be accessed for legitimate purposes, and that data will only be accessed to the exact extent it needs to be for the particular process or request.
- (Exam Topic 4)
Which of the following is NOT considered a type of data loss?
Correct Answer:
B
The exposure of data by hackers is considered a data breach. Data loss focuses on the data availability rather than security. Data loss occurs when data becomes lost, unavailable, or destroyed, when it should not have been.