Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is MOST important to include in a data use policy?

A.

The requirements for collecting and using personal data

B.

The method used to delete or destroy personal data

C.

The reason for collecting and using personal data

D.

The length of time personal data will be retained

An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?

A.

Seek approval from regulatory authorities.

B.

Conduct a privacy impact assessment (PIA).

C.

Obtain consent from the organization’s clients.

D.

Review and update the cookie policy.

When configuring information systems for the communication and transport of personal data, an organization should:

A.

adopt the default vendor specifications.

B.

review configuration settings for compliance.

C.

implement the least restrictive mode.

D.

enable essential capabilities only.

Which of the following is the MOST important consideration for determining the operational life of an encryption key?

A.

Number of entities involved in communication

B.

Number of digitally signed documents in force

C.

Volume and sensitivity of data protected

D.

Length of key and complexity of algorithm

Which of the following BEST ensures an organization's data retention requirements will be met in the public cloud environment?

A.

Data classification schemes

B.

Automated data deletion schedules

C.

Cloud vendor agreements

D.

Service level agreements (SLAs)

Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?

A.

Input reference controls

B.

Access controls

C.

Input validation controls

D.

Reconciliation controls

Which of the following is the MOST important consideration when writing an organization’s privacy policy?

A.

Using a standardized business taxonomy

B.

Aligning statements to organizational practices

C.

Ensuring acknowledgment by the organization’s employees

D.

Including a development plan for personal data handling

Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?

    Type of data being processed

A.

Applicable privacy legislation

B.

Applicable control frameworks

C.

Available technology platforms

Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?

A.

Review the privacy policy.

B.

Obtain independent assurance of current practices.

C.

Re-assess the information security requirements.

D.

Validate contract compliance.

Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?

A.

Require data dictionaries from service providers that handle the organization's personal data.

B.

Outsource personal data processing to the same third party

C.

Require independent audits of the providers' data privacy controls

D.

Require service level agreements (SLAs) to ensure data integrity while safeguarding confidentiality