From a privacy perspective, it is MOST important to ensure data backups are:
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?
Which of the following MOST effectively ensures data privacy when sharing datasets for machine learning (ML) model training?
Which of the following is the BEST method of data sanitization when there is a need to balance the destruction of data and the ability to recycle IT assets?
Which of the following is a role PRIMARILY assigned to an internal data owner?
An organization is concerned with authorized individuals accessing sensitive personal customer information to use for unauthorized purposes. Which of the following technologies is the BEST choice to mitigate this risk?
Which of the following is the BEST way to ensure an organization's enterprise risk management (ERM) framework can protect the organization from privacy harms?
Which of the following should be the FIRST consideration when selecting a data sanitization method?
Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?
Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?
When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?
When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?
Which of the following is the MOST important reason for an organization to establish a framework for privacy audits?
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
Which of the following is the BEST way to address privacy concerns when an organization captures personal data from a third party through an open application
programming interface (API)?
When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?
Which of the following BEST represents privacy threat modeling methodology?
Which of the following technologies BEST facilitates protection of personal data?
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
Which of the following is the BEST way to protect personal data in the custody of a third party?
Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?
What type of personal information can be collected by a mobile application without consent?
Which of the following is the MOST effective use of data flow diagrams when implementing a data privacy compliance program?
Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?
Which of the following should an organization do FIRST to ensure it can respond to all data subject access requests in a timely manner?
Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?
Which of the following can be used to assist with identity verification without access to the actual data?
Which of the following is the MOST important consideration for developing data retention requirements?
Which of the following is the BEST way to ensure privacy is embedded into the training of an AI model?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?
Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?
Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?
Which of the following is MOST important to include in a data use policy?
Which of the following is the best way to reduce the risk of compromised credentials when an organization allows employees to have remote access?
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following is the BEST indication of a highly effective privacy training program?
Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?
Which of the following helps define data retention time in a stream-fed data lake that includes personal data?
What is the BEST way for an organization to maintain the effectiveness of its privacy breach incident response plan?
A privacy risk assessment identified that a third-party collects personal data on the organization's behalf. This finding could subject the organization to a regulatory fine for not disclosing this relationship. What should the organization do NEXT?
A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?
Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?
Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?
Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?
Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?
Which of the following is a PRIMARY element of application and software hardening?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Require security management to validate data privacy security practices.
Conduct annual data privacy tabletop exercises
Which of the following is BEST used to validate compliance with agreed-upon service levels established with a third party that processes personal data?
Which of the following poses the GREATEST data privacy risk related to the use of large language models (LLMs)?
Which of the following BEST ensures an effective data privacy policy is implemented?
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.
Which of the following is the MOST important attribute of a privacy policy?
Breach notification period
Which cloud deployment model is BEST for an organization whose main objectives are to logically isolate personal data from other tenants and adopt custom privacy controls for the data?
In which of the following should the data record retention period be defined and established?
Which of the following outputs of a privacy audit is MOST likely to trigger remedial action?
Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?