ExamGecko
Home Home / IAPP / CIPM
Question list
Search
Search

List of questions

Search

Related questions











Question 6 - CIPM discussion

Report
Export

SCENARIO

Please use the following to answer the next QUESTION:

Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.

This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. 'It's going to be great,' the developer, Deidre Hoffman, tells you, 'if, that is, we actually get it working!' She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. 'It's just three young people,' she says, 'but they do great work.' She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. 'They do good work, so I chose them.'

Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, 'I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!'

Which is the best first step in understanding the data security practices of a potential vendor?

A.

Requiring the vendor to complete a questionnaire assessing International Organization for Standardization (ISO) 27001 compliance.

Answers
A.

Requiring the vendor to complete a questionnaire assessing International Organization for Standardization (ISO) 27001 compliance.

B.

Conducting a physical audit of the vendor's facilities.

Answers
B.

Conducting a physical audit of the vendor's facilities.

C.

Conducting a penetration test of the vendor's data security structure.

Answers
C.

Conducting a penetration test of the vendor's data security structure.

D.

Examining investigation records of any breaches the vendor has experienced.

Answers
D.

Examining investigation records of any breaches the vendor has experienced.

Suggested answer: A

Explanation:

This answer is the best first step in understanding the data security practices of a potential vendor, as it can provide a quick and easy way to evaluate the vendor's alignment with a widely recognized and respected standard for information security management systems (ISMS). Requiring the vendor to complete a questionnaire assessing ISO 27001 compliance can help you to obtain relevant and consistent information about the vendor's data security policies, objectives, risks, controls, processes and performance. The questionnaire can also help you to compare different vendors based on their level of compliance and identify any areas that need further clarification or verification.Reference: IAPP CIPM Study Guide, page 82; ISO/IEC 27002:2013, section 15.1.2

asked 22/11/2024
Venkatesh Ampolu
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first