Uncategorized

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Yolanda recently sent a request to a company asking them to delete all personal information collected about her, exercising her "right to be forgotten." What law includes this provision? A. General Data Protection Regulation (GDPR) B. Family Educational Rights & Privacy Act (FERPA) C. Health Insurance Portability & Accountability Act (HIPAA) D. Gramm Leach Bliley Act (GLBA) Correct Answer: A The right to be forgotten is a provision of the European Union's General Data Protection Regulation (GDPR). That's just a fact that you need to remember about data privacy laws. The Family Educational Rights and Privacy Act, or FERPA, governs student educational records. The Health Insurance Portability and Accountability Act, HIPAA, governs medical records, and the Gramm Leach Bliley Act, GLBA, governs financial records. None of these other laws contain a right to be forgotten provision. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Which set of organizational policies and procedures would best describe the process for moving modified source code into production? A. Change Management B. Asset Management C. Acceptable Use D. Data Governance Correct Answer: A Change management policies describe the process for requesting, reviewing, implementing, and deploying changes in a production environment. This includes the release of new source code to production use. Asset management policies are used to track hardware, software, and other assets belonging to the organization. Acceptable use policies place restrictions on how users may interact with technology systems. Data governance policies set forth requirements for data ownership, stewardship, and care. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. When using TLS to secure web communications, what encryption key is used to protect data being sent between the user and the web server? A. Web Server’s Public Key B. Ephemeral Key C. Web Server’s Private Key D. User’s Public Key Correct Answer: B When using TLS encryption, data sent during a session is encrypted using an ephemeral key created specifically for use during that session. That key is generated and encrypted using asymmetric encryption but the normal communication switches over to using faster, symmetric encryption with the ephemeral key. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...