Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following scenarios should trigger the completion of a privacy impact assessment (PIA)?

A.

Updates to data quality standards

B.

New inter-organizational data flows

C.

New data retention and backup policies

D.

Updates to the enterprise data policy

From a privacy perspective, it is MOST important to ensure data backups are:

A.

encrypted.

B.

incremental.

C.

differential.

D.

pseudonymized

Which of the following is the GREATEST benefit of adopting data minimization practices?

A.

Storage and encryption costs are reduced.

B.

Data retention efficiency is enhanced.

C.

The associated threat surface is reduced.

D.

Compliance requirements are met.

Which of the following is the BEST way to reduce the risk of compromise when transferring personal information using email?

A.

Centrally managed encryption

B.

End user-managed encryption

C.

Private cloud storage space

D.

Password-protected .zip files

Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

A.

The user’s ability to select, filter, and transform data before it is shared

B.

Umbrella consent for multiple applications by the same developer

C.

User consent to share personal data

D.

Unlimited retention of personal data by third parties

It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?

A.

Application design

B.

Requirements definition

C.

Implementation

D.

Testing

Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?

A.

Trusted zone

B.

Clean zone

C.

Raw zone

D.

Temporal zone

Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?

A.

To comply with consumer regulatory requirements

B.

To establish privacy breach response procedures

C.

To classify personal data

D.

To understand privacy risks

Which of the following should be done FIRST before an organization migrates data from an on-premise solution to a cloud-hosted solution that spans more than one jurisdiction?

A.

Ensure data loss prevention (DLP) alerts are turned on.

B.

Encrypt the data while it is being migrated.

C.

Conduct a penetration test of the hosted solution.

D.

Assess the organization's exposure related to the migration.

Using hash values With stored personal data BEST enables an organization to

A.

protect against unauthorized access.

B.

detect changes to the data.

C.

ensure data indexing performance.

D.

tag the data with classification information