Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?

A.

Understanding the data flows within the organization

B.

Implementing strong access controls on a need-to-know basis

C.

Anonymizing privacy data during collection and recording

D.

Encrypting the data throughout its life cycle

Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?

A.

Tokenization

B.

Aggregation

C.

Anonymization

D.

Encryption

What type of personal information can be collected by a mobile application without consent?

A.

Full name

B.

Geolocation

C.

Phone number

D.

Accelerometer data

An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?

A.

Database administration audit logs

B.

Historical security incidents

C.

Penetration test results

D.

Asset classification scheme

Which of the following is the BEST way to protect the privacy of data stored on a laptop in case of loss or theft?

A.

Strong authentication controls

B.

Remote wipe

C.

Regular backups

D.

Endpoint encryption

An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?

A.

Data tagging

B.

Data normalization

C.

Data mapping

D.

Data hashing

Which of the following describes a user’s “right to be forgotten”?

A.

The data is being used to comply with legal obligations or the public interest.

B.

The data is no longer required for the purpose originally collected.

C.

The individual objects despite legitimate grounds for processing.

D.

The individual’s legal residence status has recently changed.

Which of the following MOST effectively protects against the use of a network sniffer?

A.

Network segmentation

B.

Transport layer encryption

C.

An intrusion detection system (IDS)

D.

A honeypot environment

Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?

A.

Integrating security and privacy control requirements into the development of risk scenarios

B.

Prioritizing privacy-related risk scenarios as part of enterprise risk management ERM) processes

C.

Using a top-down approach to develop privacy-related risk scenarios for the organization

D.

Assigning the data protection officer accountability for privacy protection controls

Before executive leadership approves a new data privacy policy, it is MOST important to ensure:

A.

a training program is developed.

B.

a privacy committee is established.

C.

a distribution methodology is identified.

D.

a legal review is conducted.