Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following information would MOST likely be considered sensitive personal data?

A.

Mailing address

B.

Bank account login ID

C.

Ethnic origin

D.

Contact phone number

An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?

A.

Data archiving

B.

Data storage

C.

Data acquisition

D.

Data input

Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?

A.

Perform a privacy risk audit.

B.

Conduct a privacy risk assessment.

C.

Validate a privacy risk attestation.

D.

Conduct a privacy risk remediation exercise.

What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?

A.

Cross-border data transfer

B.

Support staff availability and skill set

C.

User notification

D.

Global public interest

Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?

A.

The right to object

B.

The right to withdraw consent

C.

The right to access

D.

The right to be forgotten

Which of the following is the BEST indication of a highly effective privacy training program?

A.

Members of the workforce understand their roles in protecting data privacy

B.

Recent audits have no findings or recommendations related to data privacy

C.

No privacy incidents have been reported in the last year

D.

HR has made privacy training an annual mandate for the organization_

Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?

A.

The system architecture is clearly defined.

B.

A risk assessment has been completed.

C.

Security controls are clearly defined.

D.

Data protection requirements are included.

Which of the following should be of GREATEST concern when an organization wants to store personal data in the cloud?

A.

The organization’s potential legal liabilities related to the data

B.

The data recovery capabilities of the storage provider

C.

The data security policies and practices of the storage provider

D.

Any vulnerabilities identified in the cloud system

Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?

A.

To reduce the risk of sensitive data breaches

B.

To meet the organization's security baseline

C.

To ensure technical security measures are effective

D.

To prevent possible identity theft

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

A.

Server details of the hosting environment

B.

Last logins of privileged users

C.

Last user who accessed personal data

D.

Application error events