Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
Which of the following is the BEST course of action to prevent false positives from data loss prevention (DLP) tools?
When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?
A health organization experienced a breach of a database containing pseudonymized personal data. Which of the following should be of MOST concern to the IT privacy practitioner?
Which of the following BEST ensures an effective data privacy policy is implemented?
Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
Which of the following practices BEST indicates an organization follows the data minimization principle?
Which of the following is the MOST important attribute of a privacy policy?
Breach notification period
A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?
Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?
An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following helps define data retention time in a stream-fed data lake that includes personal data?
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
Which of the following observations should be of MOST concern to an IT privacy practitioner during an evaluation of an organization’s privacy practices?
Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?
Which of the following is considered a privacy-enhancing technology (PET)?
During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Which of the following is the BEST approach when providing data subjects with access to their personal data?
Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?
Which of the following is the BEST way to reduce the risk of compromise when transferring personal information using email?
When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?
Type of data being processed
Which of the following is the MOST important reason for an organization to establish a framework for privacy audits?
An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?
Using hash values With stored personal data BEST enables an organization to
What type of personal information can be collected by a mobile application without consent?
Which of the following poses the GREATEST privacy risk for client-side application processing?
Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?
Which of the following information would MOST likely be considered sensitive personal data?
Senior management is concerned about data privacy risk resulting from the current use of duplicative technologies. Which of the following is the BEST way to prevent this problem in the future?
Which of the following BEST ensures data confidentiality across databases?
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is
BEST used to identity and review the application's runtime modules?
Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?
Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?
Which of the following is MOST suitable for facilitating and reporting to senior management on the enterprise privacy posture over time?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
Which of the following is BEST used to validate compliance with agreed-upon service levels established with a third party that processes personal data?
Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?
Which of the following is a PRIMARY element of application and software hardening?
As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
Which of the following is the MOST important consideration when choosing a method for data destruction?
Which of the following is the GREATEST benefit of adopting data minimization practices?
Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?
When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?