Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPM All Questions

View all questions & answers for the CIPM exam

Exam CIPM topic 1 question 9 discussion

Actual exam question from IAPP's CIPM
Question #: 9
Topic #: 1
[All CIPM Questions]

Which statement is FALSE regarding the use of technical security controls?

  • A. Technical security controls are part of a data governance strategy.
  • B. Technical security controls deployed for one jurisdiction often satisfy another jurisdiction.
  • C. Most privacy legislation lists the types of technical security controls that must be implemented.
  • D. A person with security knowledge should be involved with the deployment of technical security controls.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
7b9a452
2 months, 1 week ago
The most logical answer is C.
upvoted 1 times
...
Rocketly
3 months, 3 weeks ago
Selected Answer: C
It would not be practical for laws to list specific technical measures, as these evolve over time
upvoted 1 times
...
BevMe
5 months, 4 weeks ago
Selected Answer: C
Most privacy laws focus on outcomes e.g., ensuring data security rather than specifying exact technical security measures. This allows organisations the flexibility to choose controls that would work best for their environment.
upvoted 2 times
...
MaritzTee
6 months, 1 week ago
The correct answer is C. Most privacy legislation does not specify the exact types of technical security controls that must be implemented. Instead, they often require that organizations implement "appropriate" or "reasonable" security measures, leaving the specifics up to the organizations to determine based on their particular circumstances and risks.
upvoted 1 times
...
katizeti
9 months ago
Both B and C options are incorrect.
upvoted 1 times
...
giomike
10 months ago
C. Most privacy legislation lists the types of technical security controls that must be implemented. Explanation: While privacy legislation often requires organizations to protect the privacy and security of personal data, it typically does not prescribe specific technical security controls. Instead, it often outlines general principles and requirements for safeguarding information. The choice of specific technical security controls is left to the organizations themselves, considering their unique circumstances and the nature of the data they handle.
upvoted 3 times
...
krishccie
10 months, 4 weeks ago
Selected Answer: B
Jurisdictions might have different controls requirements
upvoted 1 times
...
drluvkashyap
1 year, 1 month ago
The false statement regarding the use of technical security controls is: B. Technical security controls deployed for one jurisdiction often satisfy another jurisdiction. This is false because technical security controls that are required in one jurisdiction may not be sufficient to meet the requirements of another jurisdiction. For example, the European Union's General Data Protection Regulation (GDPR) has stricter requirements for technical security controls than the United States' Health Insurance Portability and Accountability Act (HIPAA).
upvoted 1 times
...
DracoL
1 year, 5 months ago
Selected Answer: C
Answer is C because the question ask for False about data security. While Technical Security Controls are part of data goverance strategy but it in most legislation never really list what technical control required. "C. Most privacy legislation lists the types of technical security controls that must be implemented. "
upvoted 4 times
...
giomike
1 year, 6 months ago
While technical security controls play a crucial role in safeguarding data, they are not synonymous with data governance
upvoted 1 times
...
DracoL
1 year, 6 months ago
Selected Answer: A
Technical Security Controls are part of data governance strategy
upvoted 1 times
...
mansour975
1 year, 6 months ago
C maybe the correct answer
upvoted 2 times
...
tonik
1 year, 6 months ago
A or C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...