{"id":110128,"date":"2023-07-26T09:18:35","date_gmt":"2023-07-26T09:18:35","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=110128"},"modified":"2023-10-28T14:50:36","modified_gmt":"2023-10-28T14:50:36","slug":"answered-identifying-safeguarding-pii-test-20222023","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/26\/answered-identifying-safeguarding-pii-test-20222023\/","title":{"rendered":"(Answered) IDENTIFYING &amp; SAFEGUARDING PII Test 2022|2023."},"content":{"rendered":"\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/10\/Answered-IDENTIFYING-SAFEGUARDING-PII-Test-2022-2023.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Answered-IDENTIFYING-SAFEGUARDING-PII-Test-2022-2023.\"><\/object><a id=\"wp-block-file--media-d2acafe6-e65e-494b-be98-daf9c554e889\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/10\/Answered-IDENTIFYING-SAFEGUARDING-PII-Test-2022-2023.pdf\" target=\"_blank\" rel=\"noopener\">Answered-IDENTIFYING-SAFEGUARDING-PII-Test-2022-2023<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/10\/Answered-IDENTIFYING-SAFEGUARDING-PII-Test-2022-2023.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-d2acafe6-e65e-494b-be98-daf9c554e889\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n\n\n\n<p>Which of the following must Privacy Impact Assessments (PIAs) do?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyze how an organization handles information to ensure it satisfies requirements<br>-mitigate privacy risks<br>-determine the risks of collecting, using, maintaining, and disseminating PII on electronic information systems.<br>-all of the above<br>All of the Above<\/li>\n<\/ul>\n\n\n\n<p>True or False? An Individual whose PII has been stolen is susceptible to identity theft, fraud, and other damage.<br>True<\/p>\n\n\n\n<p>What \/ Which guidance identifies federal information security controls?<br>-The Freedom of Information Act (FOIA)<br>-The Privacy Act of 1974<br>-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII<br>-DOD 5400.11-R: DOD Privacy Program<br>OMB Memorandum M-17-12<\/p>\n\n\n\n<p>Which of the following is NOT an example of PII?<br>-Driver&#8217;s License Number<br>-Pet&#8217;s nickname<br>-Social Security Number<br>-Fingerprints<br>Pet&#8217;s nickname<\/p>\n\n\n\n<p>Which of the following is NOT a permitted disclosure of PII contained in a system of records?<br>-These are all permitted disclosures<br>-The record is disclosed for a new purpose that is not specified in the SORN<br>-The record is disclosed for routine use.<br>-The individual has requested that their record be disclosed.<br>The record is disclosed for a new purpose that is not specified in the SORN<\/p>\n\n\n\n<p>PIA is required when organization collects PII from:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Existing information systems and electronic collections for which no PIA was prev completed.<br>-New information systems or electronic collections.<br>(before development or purchase and\/or converting paper records to electronic systesm)<\/li>\n<\/ul>\n\n\n\n<p>PIA is not required when the information system or electronic collection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>does not collect, maintain, or disseminate PII<br>-is a national security system, including one that process classified info<\/li>\n\n\n\n<li>is solely paper-based<\/li>\n<\/ul>\n\n\n\n<p>Within what timeframe must DOD organizations report PII breaches to the United States Computer Emergency Readiness Team (US-CERT) once discovered?<br>-1 hour<br>-12 hours<br>-48 hours<br>-24 hours<br>1 hour for US-CERT<\/p>\n\n\n\n<p>(FYI: 24 hours to Component Privacy Office and 48 hours to Defense Privacy, Civil liberties, and transparency division)<\/p>\n\n\n\n<p>Your organization has a new requirement for annual security training. To track training completion, they are using employee Social Security Numbers as record identification. Is this compliant with PII safeguarding procedures?<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yes or No<br>NO<\/li>\n<\/ul>\n\n\n\n<p>You are tasked with disposing of physical copies of last year&#8217;s grant application forms. These documents contain PII so you use a cross-cut shredder to render them unrecognizable and beyond reconstruction. Is this compliant with PII safeguarding procedures?<br>-YES or NO<br>YES<\/p>\n\n\n\n<p>Organizations that fail to maintain accurate, relevant, timely, and complete information may be subject to which of the following?<br>-Neither civil nor criminal penalties<br>-civil penalties<br>-criminal penalties<br>-both civil and criminal penalties<br>Civil Penalties<\/p>\n\n\n\n<p>True or False? Paper-based PP is involved in data breaches more often than electronic PP documentation?<br>False- Phishing is responsible for most of the recent PII Breaches<\/p>\n\n\n\n<p>Which regulation governs the DoD Privacy Program?<br>-The Freedom of Information Act (FOIA)<br>-The Privacy Act of 1974<br>-OMB Memorandum M-17-12: Preparing for and responding to a breach of PII<br>-DOD 5400.11-R: DOD Privacy Program<br>-DOD 5400.11-R: DOD Privacy Program<\/p>\n\n\n\n<p>Which of the following is NOT included in a breach notification?<br>A. Articles and other media reporting the breach.<br>B. What happened, date of breach, and discovery.<br>C. Point of contact for affected individuals.<br>D. Whether the information was encrypted or otherwise protected.<br>A. Articles and other media reporting the breach.<\/p>\n\n\n\n<p>TRUE OR FALSE. A PIA is required if your system for storing PII is entirely on paper.<br>FALSE<\/p>\n\n\n\n<p>TRUE OR FALSE. Misuse of PII can result in legal liability of the individual.<br>TRUE<\/p>\n\n\n\n<p>TRUE OR FALSE. Misuse of PII can result in legal liability of the organization.<br>TRUE<\/p>\n\n\n\n<p>Where is a System of Records Notice (SORN) filed?<br>A. National Archives and Records Administration<br>B. Congress<br>C. Federal Register<br>D. SORNs are for internal reference only, and don&#8217;t need to be filed with a third party.<br>Federal Register<\/p>\n\n\n\n<p>Organizations must report to Congress the status of their PII holdings every:<br>A. Six Months<br>B. Year<br>C. Five years<br>D. Organizations are not required to report to Congress<br>Year<\/p>\n\n\n\n<p>Jane Student is delivering a document that contains PII, but she cannot find the correct cover sheet. She should:<br>A. Mark the document CUI and deliver it without the cover sheet.<br>B. Mark the document as sensitive and deliver it without the cover sheet.<br>C. Mark the document CUI and wait to deliver it until she has the cover sheet.<br>D. None of the above; provided she is delivering it by hand, it does not require a cover sheet or markings.<br>Mark the document CUI and wait to deliver it until she has the cover sheet<\/p>\n\n\n\n<p>The acronym PHI, in this context, refers to:<br>A. Protected Health Information<br>B. Public Health Institute<br>C. Public Health Informatics<br>D. Public Health Intelligence<br>Protected Health Information<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>An organization that fails to protect PII can face consequences including<br>All of the Above<\/p>\n\n\n\n<p>Use and Disclosure of PII<\/p>\n\n\n\n<p>True or False?<br>Information that can be combined with other information to link solely to an individual is considered PII.<br>True<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>Which of the following is NOT a permitted disclosure of PII contained in a system of records?<br>The purpose is disclosed with a new purpose that is not encompassed by SORN<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What guidance identifies federal information security controls?<br>OMB Memorandum M-17-12<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>Which of the following must Privacy Impact Assessments (PIAs) do?<br>All of the Above<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What regulation governs the DoD Privacy Program?<br>DoD 5400.11-R: DoD Privacy Program<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What law establishes the federal government&#8217;s legal responsibility for safeguarding PII?<br>Privacy Act of 1974<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>What law establishes the public&#8217;s right to access federal government information?<br>FOIA<\/p>\n\n\n\n<p>Use and Disclosure of PII<br>No disclosure of a record in a system of records unless:<br>The individual to whom the record pertains:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>submits a written request<\/li>\n\n\n\n<li>has given prior written consent<\/li>\n<\/ul>\n\n\n\n<p>OR<br>Includes &#8220;routine use&#8221; of records, as defined in the SORN<\/p>\n\n\n\n<p>Safeguarding PII<\/p>\n\n\n\n<p>Your coworker was teleworking when the agency e-mail system shut down. She had an urgent deadline so she sent you an encrypted set of records containing PII from her personal e-mail account. Is this compliant with PII safeguarding procedures?<br>No<\/p>\n\n\n\n<p>If you discover a data breach you should immediately notify the proper authority and also:<br>document where and when the potential breach was found:<br>-record URL for PII on the web<\/p>\n\n\n\n<p>Officials or employees who knowingly disclose PII to someone without a need-to-know may be subject to which of the following?<br>Both civil and criminal penalties<\/p>\n\n\n\n<p>Which of the following is NOT an example of an administrative safeguard that organizations use to protect PII?<br>List all potential future uses of PII in the System of Records Notice (SORN)<\/p>\n\n\n\n<p>True or False?<br>Phishing is not often responsible for PII data breaches.<br>False<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following must Privacy Impact Assessments (PIAs) do? True or False? An Individual whose PII has been stolen is susceptible to identity theft, fraud, and other damage.True What \/ Which guidance identifies federal information security controls?-The Freedom of Information Act (FOIA)-The Privacy Act of 1974-OMB Memorandum M-17-12: Preparing for and responding to a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-110128","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=110128"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/110128\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=110128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=110128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=110128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}