Exam CIPM All QuestionsBrowse all questions from this exam
Question 8

Which statement is FALSE regarding the use of technical security controls?

    Correct Answer: C

    Most privacy legislation typically does not specify the exact types of technical security controls that must be implemented. Instead, these laws and regulations generally outline broad requirements or principles for safeguarding data, leaving it up to organizations to determine the specific technical controls needed based on their unique circumstances and the nature of the data they are handling. Therefore, the statement saying that most privacy legislation lists the types of technical security controls that must be implemented is false.

Discussion
DracoLOption: C

Answer is C because the question ask for False about data security. While Technical Security Controls are part of data goverance strategy but it in most legislation never really list what technical control required. "C. Most privacy legislation lists the types of technical security controls that must be implemented. "

giomikeOption: C

C. Most privacy legislation lists the types of technical security controls that must be implemented. Explanation: While privacy legislation often requires organizations to protect the privacy and security of personal data, it typically does not prescribe specific technical security controls. Instead, it often outlines general principles and requirements for safeguarding information. The choice of specific technical security controls is left to the organizations themselves, considering their unique circumstances and the nature of the data they handle.

BevMeOption: C

Most privacy laws focus on outcomes e.g., ensuring data security rather than specifying exact technical security measures. This allows organisations the flexibility to choose controls that would work best for their environment.

mansour975Option: C

C maybe the correct answer

MaritzTeeOption: C

The correct answer is C. Most privacy legislation does not specify the exact types of technical security controls that must be implemented. Instead, they often require that organizations implement "appropriate" or "reasonable" security measures, leaving the specifics up to the organizations to determine based on their particular circumstances and risks.

katizetiOption: B

Both B and C options are incorrect.

krishccieOption: B

Jurisdictions might have different controls requirements

drluvkashyapOption: B

The false statement regarding the use of technical security controls is: B. Technical security controls deployed for one jurisdiction often satisfy another jurisdiction. This is false because technical security controls that are required in one jurisdiction may not be sufficient to meet the requirements of another jurisdiction. For example, the European Union's General Data Protection Regulation (GDPR) has stricter requirements for technical security controls than the United States' Health Insurance Portability and Accountability Act (HIPAA).

giomikeOption: A

While technical security controls play a crucial role in safeguarding data, they are not synonymous with data governance

DracoLOption: A

Technical Security Controls are part of data governance strategy

tonik

A or C