Question 19

- (Exam Topic 2)
Which of the following data security policies is most likely to be the result of a data privacy law?

Correct Answer:A

Question 20

- (Exam Topic 2)
Which of the following bring-your-own-device (BYOD) practices is likely to increase the risk of infringement on local regulations such as copyright or privacy laws?

Correct Answer:D

Question 21

- (Exam Topic 2)
Which of the following authentication controls combines what a user knows with the unique characteristics of the user respectively?

Correct Answer:B

Question 22

- (Exam Topic 2)
Which of the following financial instruments should be recorded at fair market value on the financial statements?

Correct Answer:D

Question 23

- (Exam Topic 2)
Which of the following statements is true with regard to information protection?

Correct Answer:A

Question 24

- (Exam Topic 2)
During which phase of the contacting process ate contracts drafted for a proposed business activity?

Correct Answer:A

START IIA-CIA-Part3 EXAM