Which of the following is the MOST important consideration for determining the operational life of an encryption key?
The most important consideration for determining the operational life of an encryption key is the volume and sensitivity of data protected by the key. The operational life of an encryption key is the period of time during which the key can be used securely and effectively to encrypt and decrypt data. The operational life of an encryption key depends on various factors, such as the length and complexity of the key, the strength and speed of the encryption algorithm, the number and frequency of encryption operations, the number of entities involved in communication, and the number of digitally signed documents in force. However, among these factors, the volume and sensitivity of data protected by the key is the most critical, as it affects the risk and impact of a potential compromise or exposure of the key. The higher the volume and sensitivity of data protected by the key, the shorter the operational life of the key should be, as this reduces the window of opportunity for an attacker to access or misuse the data.
Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?
The best way to ensure that application hardening is included throughout the software development life cycle (SDLC) is to include qualified application security personnel as part of the process. Application hardening is the process of applying security measures and techniques to an application to reduce its attack surface, vulnerabilities, and risks. Application hardening should be integrated into every stage of the SDLC, from planning and design to development and testing to deployment and maintenance. Including qualified application security personnel as part of the process helps to ensure that application hardening is performed effectively and consistently, as well as to provide guidance, feedback, and support to the developers, testers, and project managers. The other options are not as effective or sufficient as including qualified application security personnel as part of the process, as they do not address the root cause of the lack of application hardening, which is the gap in skills and knowledge among the SDLC participants.
An increase in threats originating from endpoints is an indication that:
Extended detection and response (XDR) is a security solution that collects and analyzes data from multiple sources, such as endpoints, networks, servers, cloud, and applications, to detect and respond to threats in real time. XDR should be installed to address the increase in threats originating from endpoints, as it provides a holistic and integrated view of the threat landscape, as well as automated and coordinated actions to contain and remediate the threats. XDR also helps to improve the visibility, efficiency, and effectiveness of the security operations, as well as to reduce the complexity and costs of managing multiple security tools.
Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?
Privacy by design is an approach that embeds privacy principles and considerations into the design and development of products, services, systems, and processes that involve personal dat
a. Privacy by design aims to protect the privacy and security of the data subjects, as well as to comply with the applicable privacy laws and regulations. One of the key principles of privacy by design is to obtain the consent and choice of the data subjects regarding the collection, use, and disclosure of their personal data. Therefore, the best example of privacy by design in the development of a consumer mobile application is to require consent before sharing locations, as this gives the data subjects control and transparency over their personal data. The other options are not as effective or sufficient as requiring consent before sharing locations, as they do not address the principle of consent and choice, or they may violate other privacy principles or requirements.
Who is ULTIMATELY accountable for the protection of personal data collected by an organization?
The data owner is the person or entity who has the ultimate authority and responsibility for the protection of personal data collected by an organization. The data owner defines the purpose, scope, classification, and retention of the personal data, as well as the rights and obligations of the data subjects and other parties involved in the data processing. The data owner also ensures that the personal data is handled in compliance with the applicable privacy laws and regulations, as well as the organization's privacy policies and standards. The data owner may delegate some of the operational tasks to the data processor, data custodian, or data protection officer, but the accountability remains with the data owner.
Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits
Get All 218 Questions & Answers