The ____ is responsible for establishing a risk management program for privacy-related risks only.
A. risk specialist
B. control specialist
C. privacy specialist
D. incident specialist
Answer: C
You might also like to view...
Use gawk to determine how many lines in /etc/services contain the string Mail. Verify your answer using grep.
What will be an ideal response?
Using nested If…Then…Else statements is a much more convenient way of coding a multiple-alternative selection structure than using the Case statement.
Answer the following statement true (T) or false (F)
Data can be entered into a database in ________ different ways
A) two B) three C) four D) five
Tom believes that a customer of his Internet service provider has been exploiting a vulnerability in his system to read the email messages of other customers. If true, what law did the customer most likely violate?
A. ECPA B. CALEA C. HITECH D. Privacy Act