The privacy specialist documents and maintains records of all ____ practices used to protect personal data.

A. data-based
B. risk-based
C. control-based
D. threat-based


Answer: B

Computer Science & Information Technology

You might also like to view...

Big O notation describes ________.

a. the amount of memory required by an algorithm. b. the difficulty of writing an algorithm to solve a specific problem. c. an algorithm’s efficiency in terms of the work required to solve a problem. d. the length of an algorithm for solving a specific problem.

Computer Science & Information Technology

What type of grid would you normally use for term papers?

A) One-column B) Two-column C) Right-column D) Left-column

Computer Science & Information Technology

Instant messaging (IM) is a secure method of electronic communication

Indicate whether the statement is true or false

Computer Science & Information Technology

Which type of cable has only two twisted pairs?

a. UTP b. Coaxial c. POTS line d. Fiber

Computer Science & Information Technology