An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?
When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
Which of the following helps define data retention time in a stream-fed data lake that includes personal data?
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?
A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the
lender. Which fundamental data subject right does this process infringe upon?
Which of the following is the MOST important consideration when writing an organization’s privacy policy?
Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?
Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?
Which of the following is the MOST important attribute of a privacy policy?
Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?
Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?
Which of the following is the GREATEST benefit of adopting data minimization practices?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
Which of the following is the BEST practice to protect data privacy when disposing removable backup media?
Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?
In which of the following should the data record retention period be defined and established?
Before executive leadership approves a new data privacy policy, it is MOST important to ensure:
Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?
Which of the following is the MOST effective way to support organizational privacy awareness objectives?
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
Which of the following is the BEST control to detect potential internal breaches of personal data?
Which of the following practices BEST indicates an organization follows the data minimization principle?
What type of personal information can be collected by a mobile application without consent?
Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?
Which of the following is MOST important when developing an organizational data privacy program?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.
A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?
Which of the following is the BEST indication of an effective records management program for personal data?
Which of the following MUST be available to facilitate a robust data breach management response?
Which of the following processes BEST enables an organization to maintain the quality of personal data?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
Which of the following MOST significantly impacts an organization's ability to respond to data subject access requests?
Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?
Which of the following is the BEST way to explain the difference between data privacy and data security?
Which of the following deployed at an enterprise level will MOST effectively block malicious tracking of user Internet browsing?
A data processor that handles personal data tor multiple customers has decided to migrate its data warehouse to a third-party provider. What is the processor
obligated to do prior to implementation?
Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?
Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
What is the BEST way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?