Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?
An organization is concerned with authorized individuals accessing sensitive personal customer information to use for unauthorized purposes. Which of the following technologies is the BEST choice to mitigate this risk?
Which of the following should be done FIRST when performing a data quality assessment?
Which of the following is the BEST way to protect the privacy of data stored on a laptop in case of loss or theft?
Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?
Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
Which of the following should be considered personal information?
Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?
Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?
Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?
Which of the following is the BEST way for senior management to verify the success of its commitment to privacy by design?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following is the BEST way to protect personal data in the custody of a third party?
Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?
Which of the following is MOST important to include in a data use policy?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
Which of the following is the MOST important consideration when determining retention periods for personal data?
Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?
Which of the following MOST effectively protects against the use of a network sniffer?
Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?
When configuring information systems for the communication and transport of personal data, an organization should:
A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?
How can an organization BEST ensure its vendors are complying with data privacy requirements defined in their contracts?
A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?
Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
From a privacy perspective, it is MOST important to ensure data backups are:
An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content
viewed, and the time and duration of online activities. Which data protection principle is applied?
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
Transport Layer Security (TLS) provides data integrity through:
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
Which of the following is the MOST effective way to support organizational privacy awareness objectives?
Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?
Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?
Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?
An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?
Which of the following is the MOST important consideration when choosing a method for data destruction?
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?
Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?
Which of the following is the MOST important privacy consideration for video surveillance in high security areas?
An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?
When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?
Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?
Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?
Which of the following BEST ensures data confidentiality across databases?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Which of the following protocols BEST protects end-to-end communication of personal data?
In which of the following should the data record retention period be defined and established?
Which of the following describes a user’s “right to be forgotten”?
Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?
Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?
An organization must de-identify its data before it is transferred to a third party Which of the following should be done FIRST?
Which of the following is the best way to reduce the risk of compromised credentials when an organization allows employees to have remote access?