Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?
Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?
When configuring information systems for the communication and transport of personal data, an organization should:
An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?
Which of the following would BEST support an organization in fulfilling data subject rights?
An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?
Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
Which of the following poses the GREATEST privacy risk for client-side application processing?
A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?
A staffing agency collects a broad scope of data on candidates (including education, credit, and medical history). This may violate which of the following data privacy principles?
A project manager for a new data collection system had a privacy impact assessment (PIA) completed before the solution was designed. Once the system was released into production, an audit revealed personal data was being collected that was not part of the PIA What is the BEST way to avoid this situation in the future?
When can data subjects be prohibited from withdrawing consent for processing their personal data?
Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?
Which of the following provides the BEST assurance that a potential vendor is able to comply with privacy regulations and the organization's data privacy policy?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following poses the GREATEST data privacy risk related to the use of large language models (LLMs)?
Which of the following scenarios should trigger the completion of a privacy impact assessment (PIA)?
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?
Which of the following information would MOST likely be considered sensitive personal data?
When data processing is performed at a third-party data center, ownership of the risk PRIMARILY rests with the:
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following BEST ensures an effective data privacy policy is implemented?
Which of the following should be done FIRST before an organization migrates data from an on-premise solution to a cloud-hosted solution that spans more than one jurisdiction?
Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?
Which of the following helps to ensure the identities of individuals in a two-way communication are verified?
Which of the following practices BEST indicates an organization follows the data minimization principle?
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?
Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?
Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?
Which of the following outputs of a privacy audit is MOST likely to trigger remedial action?
Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?
A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?
Which of the following is the MOST important consideration when choosing a method for data destruction?
Which of the following MOST effectively protects against the use of a network sniffer?
An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
What is the BEST method to protect customers’ personal data that is forwarded to a central system for analysis?
An organization is concerned with authorized individuals accessing sensitive personal customer information to use for unauthorized purposes. Which of the following technologies is the BEST choice to mitigate this risk?
Which of the following is MOST suitable for facilitating and reporting to senior management on the enterprise privacy posture over time?
Which of the following is the MOST important privacy consideration for video surveillance in high security areas?
Which of the following is the MOST important consideration when determining retention periods for personal data?
Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?
Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
When choosing data sources to be used within a big data architecture, which of the following data attributes MUST be considered to ensure data is not aggregated?
Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?
Which of the following is the BEST indication of an effective records management program for personal data?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
Which of the following BEST mitigates the privacy risk associated with setting cookies on a website?
An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption
keys?
What is the BEST way for an organization to maintain the effectiveness of its privacy breach incident response plan?
Which of the following should an IT privacy practitioner review FIRST to understand where personal data is coming from and how it is used within the organization?