Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Require security management to validate data privacy security practices.
Conduct annual data privacy tabletop exercises
A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?
In which of the following should the data record retention period be defined and established?
A health organization experienced a breach of a database containing pseudonymized personal data. Which of the following should be of MOST concern to the IT privacy practitioner?
Which of the following should be done FIRST before an organization migrates data from an on-premise solution to a cloud-hosted solution that spans more than one jurisdiction?
An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content
viewed, and the time and duration of online activities. Which data protection principle is applied?
Which of the following is the BEST approach for an organization that wants to transfer risk associated with a potential breach involving customer personal data?
Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?
An online retail company is trying to determine how to handle users’ data if they unsubscribe from marketing emails generated from the website. Which of the following is the BEST approach for handling personal data that has been restricted?
Which of the following is the BEST way to address privacy concerns when an organization captures personal data from a third party through an open application
programming interface (API)?
When choosing data sources to be used within a big data architecture, which of the following data attributes MUST be considered to ensure data is not aggregated?
Which of the following should be of GREATEST concern when an organization wants to store personal data in the cloud?
Which of the following is the BEST way to explain the difference between data privacy and data security?
Which of the following MOST significantly impacts an organization's ability to respond to data subject access requests?
A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?
Which of the following is the MOST important consideration for determining the operational life of an encryption key?
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?
A staffing agency collects a broad scope of data on candidates (including education, credit, and medical history). This may violate which of the following data privacy principles?
Which of the following is MOST important when developing an organizational data privacy program?
The BEST way for a multinational organization to ensure the comprehensiveness of its data privacy policy is to perform an annual review of changes to privacy
regulations in.
Which of the following is the BEST course of action to prevent false positives from data loss prevention (DLP) tools?
Which of the following is the MOST effective way to support organizational privacy awareness objectives?
A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?
Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?
Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?
Which of the following is the BEST way to ensure an organization's enterprise risk management (ERM) framework can protect the organization from privacy harms?
Which of the following is the GREATEST benefit of adopting data minimization practices?
Which of the following should be done NEXT after a privacy risk has been accepted?
A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows
users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?
Which of the following BEST represents privacy threat modeling methodology?
Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?
Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?
Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
Which of the following is the MOST important consideration when determining retention periods for personal data?
Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?
Transport Layer Security (TLS) provides data integrity through:
Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
Which of the following should an organization do FIRST to ensure it can respond to all data subject access requests in a timely manner?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
When capturing browsing and purchase data from consumers visiting a corporate website more than once, which of the following metadata-based technologies is typically used to identify a consumer?
Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
What is the BEST method to protect customers’ personal data that is forwarded to a central system for analysis?
Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?
Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?
When data processing is performed at a third-party data center, ownership of the risk PRIMARILY rests with the:
Which data warehousing operating model masks data within a larger database to provide subset views to users?
Which of the following is the MOST effective use of data flow diagrams when implementing a data privacy compliance program?
Which of the following system architectures BEST supports anonymity for data transmission?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following is the MOST important consideration when processing personal data for an AI project?
Which of the following observations should be of MOST concern to an IT privacy practitioner during an evaluation of an organization’s privacy practices?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is
BEST used to identity and review the application's runtime modules?
An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption
keys?
Which party should data subject contact FIRST if they believe their personal information has been collected and used without consent?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
Which of the following should be considered personal information?
When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?
Which of the following is the MOST important consideration to ensure privacy when using big data analytics?
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
Which of the following should an IT privacy practitioner review FIRST to understand where personal data is coming from and how it is used within the organization?
Which of the following is a foundational goal of data privacy laws?
Which of the following is the BEST approach to minimize privacy risk when collecting personal data?
The purpose of consent tagging is to:
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
Which of the following MUST be available to facilitate a robust data breach management response?