Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?
Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?
Which of the following BEST ensures an organization's data retention requirements will be met in the public cloud environment?
Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?
Which of the following protocols BEST protects end-to-end communication of personal data?
Which of the following technologies BEST facilitates protection of personal data?
Which of the following practices BEST indicates an organization follows the data minimization principle?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?
Which of the following is the FIRST step toward the effective management of personal data assets?
Which of the following MUST be available to facilitate a robust data breach management response?
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?
Which of the following observations should be of MOST concern to an IT privacy practitioner during an evaluation of an organization’s privacy practices?
An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption
keys?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
Which of the following is the MOST important consideration when processing personal data for an AI project?
Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?
Which of the following information would MOST likely be considered sensitive personal data?
Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?
Which of the following is MOST important when developing an organizational data privacy program?
Which of the following is considered a privacy-enhancing technology (PET)?
A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?
Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?
Which of the following is a role PRIMARILY assigned to an internal data owner?
Before executive leadership approves a new data privacy policy, it is MOST important to ensure:
A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?
Which of the following is a PRIMARY element of application and software hardening?
A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows
users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?
A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is
BEST used to identity and review the application's runtime modules?
Which of the following would BEST ensure privacy when utilizing AI-based technologies?
An organization is considering whether to expand its operations into additional international jurisdictions. After performing a privacy risk assessment, the organization decides not to begin operating in those jurisdictions. Which of the following BEST describes this type of risk response?
Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
Which of the following has the GREATEST impact on the treatment of data within the scope of an organization's privacy policy?
Which of the following is the BEST control to detect potential internal breaches of personal data?
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?
Which of the following is the MOST important consideration when determining retention periods for personal data?
During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Require security management to validate data privacy security practices.
Conduct annual data privacy tabletop exercises
A project manager for a new data collection system had a privacy impact assessment (PIA) completed before the solution was designed. Once the system was released into production, an audit revealed personal data was being collected that was not part of the PIA What is the BEST way to avoid this situation in the future?
Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?
Which of the following is BEST used to validate compliance with agreed-upon service levels established with a third party that processes personal data?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?
Which of the following is the BEST way to ensure privacy considerations are included when working with vendors?
Which of the following MOST effectively protects against the use of a network sniffer?
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
Which of the following is the BEST indication of an effective records management program for personal data?
Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?
An organization's work-from-home policy allows employees to access corporate IT assets remotely Which of the following controls is MOST important to mitigate the
risk of potential personal data compromise?
Which of the following helps define data retention time in a stream-fed data lake that includes personal data?