The ____ is responsible for establishing a risk management program for privacy-related risks only.

A. risk specialist
B. control specialist
C. privacy specialist
D. incident specialist


Answer: C

Computer Science & Information Technology

You might also like to view...

Use gawk to determine how many lines in /etc/services contain the string Mail. Verify your answer using grep.

What will be an ideal response?

Computer Science & Information Technology

Using nested If…Then…Else statements is a much more convenient way of coding a multiple-alternative selection structure than using the Case statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Data can be entered into a database in ________ different ways

A) two B) three C) four D) five

Computer Science & Information Technology

Tom believes that a customer of his Internet service provider has been exploiting a vulnerability in his system to read the email messages of other customers. If true, what law did the customer most likely violate?

A. ECPA B. CALEA C. HITECH D. Privacy Act

Computer Science & Information Technology