Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?

A.

Data should be used to improve employee performance.

B.

Data should be retained per the organization's retention policy

C.

Data access should be restricted based on roles.

D.

Data analysis should be used to set staffing levels

Which of the following is the best way to reduce the risk of compromised credentials when an organization allows employees to have remote access?

A.

Enable whole disk encryption on remote devices.

B.

Purchase an endpoint detection and response (EDR) tool.

C.

Implement multi-factor authentication.

D.

Deploy single sign-on with complex password requirements.

Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?

A.

De-identifying the data to be analyzed

B.

Verifying the data subjects have consented to the processing

C.

Defining the intended objectives

D.

Ensuring proper data sets are used to train the models

Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?

A.

Online behavioral tracking

B.

Radio frequency identification (RFID)

C.

Website cookies

D.

Beacon-based tracking

Which of the following should be done FIRST when performing a data quality assessment?

A.

Identify the data owner.

B.

Define data quality rules.

C.

Establish business thresholds-

D.

Assess completeness of the data inventory.

Which of the following is MOST important to establish within a data storage policy to protect data privacy?

A.

Data redaction

B.

Data quality assurance (QA)

C.

Irreversible disposal

D.

Collection limitation

The MOST effective way to incorporate privacy by design principles into applications is to include privacy requirements in.

A.

senior management approvals.

B.

secure coding practices

C.

software development practices.

D.

software testing guidelines.

Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?

A.

The service provider has denied the organization’s request for right to audit.

B.

Personal data stored on the cloud has not been anonymized.

C.

The extent of the service provider’s access to data has not been established.

D.

The data is stored in a region with different data protection requirements.

Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?

A.

Privacy policy

B.

Network security standard

C.

Multi-factor authentication

D.

Virtual private network (VPN)

Which of the following system architectures BEST supports anonymity for data transmission?

A.

Client-server

B.

Plug-in-based

C.

Front-end

D.

Peer-to-peer