Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?

A.

De-identify all data.

B.

Develop a data dictionary.

C.

Encrypt all sensitive data.

D.

Perform data discovery.

When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?

A.

Co-regulatory

B.

Sectoral

C.

Comprehensive

D.

Self-regulatory

Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?

A.

Evaluate the impact resulting from this change.

B.

Revisit the current remote working policies.

C.

Implement a virtual private network (VPN) tool.

D.

Enforce multi-factor authentication for remote access.

Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?

A.

The application only stores data locally.

B.

The application shares personal information upon request.

C.

The application only stores data for 24 hours.

D.

The application requires consent before sharing locations.

As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

A.

Identify sensitive unstructured data at the point of creation.

B.

Classify sensitive unstructured data.

C.

Identify who has access to sensitive unstructured data.

D.

Assign an owner to sensitive unstructured data.

Which of the following deployed at an enterprise level will MOST effectively block malicious tracking of user Internet browsing?

A.

Web application firewall (WAF)

B.

Website URL blacklisting

C.

Domain name system (DNS) sinkhole

D.

Desktop antivirus software

Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?

A.

The data is encrypted and a key is required to re-identify the data.

B.

Key fields are hidden and unmasking is required to access to the data.

C.

Names and addresses are removed but the rest of the data is left untouched.

D.

The data is transformed such that re-identification is impossible.

Which of the following is the BEST way to address privacy concerns when an organization captures personal data from a third party through an open application

programming interface (API)?

A.

Develop a service level agreement (SLA) with the third party

B.

Implement encryption for the data transmission

C.

Obtain consent from the data subjects

D.

Review the specification document of the open API.

Which of the following is the BEST way for senior management to verify the success of its commitment to privacy by design?

A.

Review the findings of an industry benchmarking assessment

B.

Identify trends in the organization's amount of compromised personal data

C.

Review the findings of a third-party privacy control assessment

D.

Identify trends in the organization's number of privacy incidents.

An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is

BEST used to identity and review the application's runtime modules?

A.

Static application security testing (SAST)

B.

Dynamic application security testing (DAST)

C.

Regression testing

D.

Software composition analysis