ExamGecko
Home Home / IAPP / CIPM
Question list
Search
Search

List of questions

Search

Related questions











Question 36 - CIPM discussion

Report
Export

Which statement is FALSE regarding the use of technical security controls?

A.

Technical security controls are part of a data governance strategy.

Answers
A.

Technical security controls are part of a data governance strategy.

B.

Technical security controls deployed for one jurisdiction often satisfy another jurisdiction.

Answers
B.

Technical security controls deployed for one jurisdiction often satisfy another jurisdiction.

C.

Most privacy legislation lists the types of technical security controls that must be implemented.

Answers
C.

Most privacy legislation lists the types of technical security controls that must be implemented.

D.

A person with security knowledge should be involved with the deployment of technical security controls.

Answers
D.

A person with security knowledge should be involved with the deployment of technical security controls.

Suggested answer: C

Explanation:

The statement that is false regarding the use of technical security controls is that most privacy legislation lists the types of technical security controls that must be implemented.Technical security controls are the hardware and software components that protect a system against cyberattacks, such as encryption, firewalls, antivirus software, and access control mechanisms1However, most privacy legislation does not prescribe specific types of technical security controls that must be implemented by organizations.Instead, they usually require organizations to implement reasonable or appropriate technical security measures to protect personal data from unauthorized or unlawful access, use, disclosure, alteration, or destruction23The exact level and type of technical security controls may depend on various factors, such as the nature and sensitivity of the data, the risks and threats involved, the state of the art technology available, and the cost and feasibility of implementation4Therefore, organizations have some flexibility and discretion in choosing the most suitable technical security controls for their data processing activities.Reference:1:Technical Controls --- Cybersecurity Resilience - Resilient Energy Platform;2: [General Data Protection Regulation (GDPR) -- Official Legal Text], Article 32;3: [Privacy Act 1988], Schedule 1 - Australian Privacy Principles (APPs), APP 11;4:Technical Security Controls: Encryption, Firewalls & More

asked 22/11/2024
HW Yan
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first