Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?
An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?
An organization has initiated a project to enhance privacy protections by improving its information security controls. Which of the following is the MOST useful action to help define the scope of the project?
Which of the following should be the FIRST consideration when conducting a privacy impact assessment (PIA)?
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
Which of the following BEST ensures an effective data privacy policy is implemented?
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?
When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
Which of the following MUST be available to facilitate a robust data breach management response?
Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?
Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?
Which of the following is a role PRIMARILY assigned to an internal data owner?
Which of the following should be the FIRST consideration when selecting a data sanitization method?
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption
keys?
Which of the following is the BEST control to detect potential internal breaches of personal data?
Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
What type of personal information can be collected by a mobile application without consent?
In which of the following should the data record retention period be defined and established?
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Which of the following is a PRIMARY element of application and software hardening?
Which of the following scenarios should trigger the completion of a privacy impact assessment (PIA)?
Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
The BEST way for a multinational organization to ensure the comprehensiveness of its data privacy policy is to perform an annual review of changes to privacy
regulations in.
An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?
An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
An organization must de-identify its data before it is transferred to a third party Which of the following should be done FIRST?
Which of the following should be done FIRST before an organization migrates data from an on-premise solution to a cloud-hosted solution that spans more than one jurisdiction?
Which of the following is the BEST approach to minimize privacy risk when collecting personal data?
Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?
An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?
A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?
As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?
A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?
An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
A project manager for a new data collection system had a privacy impact assessment (PIA) completed before the solution was designed. Once the system was released into production, an audit revealed personal data was being collected that was not part of the PIA What is the BEST way to avoid this situation in the future?