Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPM All Questions

View all questions & answers for the CIPM exam

Exam CIPM topic 1 question 85 discussion

Actual exam question from IAPP's CIPM
Question #: 85
Topic #: 1
[All CIPM Questions]

SCENARIO -
Please use the following to answer the next question:
Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.
One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.
Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.
If this were a data breach, how is it likely to be categorized?

  • A. Availability Breach.
  • B. Authenticity Breach.
  • C. Confidentiality Breach.
  • D. Integrity Breach.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
7f814c6
3 months, 1 week ago
Selected Answer: D
D. Integrity Breach: An integrity breach involves unauthorized alterations to data, affecting its accuracy or completeness. Since Ben notices unusual activity and is concerned that something might be amiss with the company files, this could imply that the data might have been tampered with or altered in some way, affecting its integrity. Not C. A confidentiality breach involves unauthorized access to data, potentially exposing it to unauthorized parties. While Ben’s concern might also involve unauthorized access, the description focuses more on unusual activity that could suggest tampering, which is more aligned with an integrity breach.
upvoted 1 times
...
katizeti
10 months ago
Confidentiality Breach - A
upvoted 1 times
...
Cock
1 year ago
Selected Answer: C
A confidentiality breach involves unauthorized access to sensitive or private information, which matches the situation Ben is noticing unusual user activity on company files.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...