Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?
Which of the following is the MOST important consideration for developing data retention requirements?
An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption
keys?
Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?
When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?
Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?
Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?
When configuring information systems for the communication and transport of personal data, an organization should:
Which of the following poses the GREATEST privacy risk for client-side application processing?
Which of the following is the BEST practice to protect data privacy when disposing removable backup media?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following has the GREATEST impact on the treatment of data within the scope of an organization's privacy policy?
Which of the following information would MOST likely be considered sensitive personal data?
Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
Which of the following is the BEST method of data sanitization when there is a need to balance the destruction of data and the ability to recycle IT assets?
Which of the following is the BEST course of action to prevent false positives from data loss prevention (DLP) tools?
Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?
Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?
Which of the following is the GREATEST benefit of adopting data minimization practices?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?
Which of the following is the PRIMARY reason that organizations need to map the data flows of personal data?
Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?
Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?
Which of the following is the MOST important privacy consideration for video surveillance in high security areas?
Which of the following BEST represents privacy threat modeling methodology?
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows
users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?
Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
Which of the following is the BEST indication of a highly effective privacy training program?
Which of the following is the best way to reduce the risk of compromised credentials when an organization allows employees to have remote access?
Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?
Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?
Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
Which of the following helps to ensure the identities of individuals in a two-way communication are verified?
Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?