Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?
Which of the following is the MOST important consideration for developing data retention requirements?
A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?
Which of the following should be done FIRST when developing an organization-wide strategy to address data privacy risk?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
Which of the following should an IT privacy practitioner review FIRST to understand where personal data is coming from and how it is used within the organization?
An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?
The MOST effective way to incorporate privacy by design principles into applications is to include privacy requirements in.
A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?
Which encryption method encrypts and decrypts data using two separate yet mathematically connected cryptographic keys?
As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?
An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption
keys?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
Which of the following has the GREATEST impact on the treatment of data within the scope of an organization's privacy policy?
Which of the following information would MOST likely be considered sensitive personal data?
An organization plans to implement a new cloud-based human resources (HR) solution with a mobile application interface. Which of the following is the BEST control to prevent data leakage?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
An organization's work-from-home policy allows employees to access corporate IT assets remotely Which of the following controls is MOST important to mitigate the
risk of potential personal data compromise?
Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?
Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?
Which of the following is the MOST important privacy consideration for video surveillance in high security areas?
In which of the following should the data record retention period be defined and established?
Which cloud deployment model is BEST for an organization whose main objectives are to logically isolate personal data from other tenants and adopt custom privacy controls for the data?
Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
What type of personal information can be collected by a mobile application without consent?
Which of the following should be the FIRST consideration when selecting a data sanitization method?
Which of the following should be done FIRST when performing a data quality assessment?
An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities. Which data protection principle is applied?
Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?
Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?
Which of the following should be the FIRST consideration when conducting a privacy impact assessment (PIA)?
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?
A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
Which of the following helps to ensure the identities of individuals in a two-way communication are verified?
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?
Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?
A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the
lender. Which fundamental data subject right does this process infringe upon?
Which of the following is the BEST control to detect potential internal breaches of personal data?
Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?
Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?
Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?
Which of the following is the BEST way to explain the difference between data privacy and data security?
Which of the following is the MOST important consideration when choosing a method for data destruction?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following is the MOST important consideration when determining retention periods for personal data?