Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?

A.

Data taxonomy

B.

Data classification

C.

Data collection

D.

Data flows

Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?

A.

Chief data officer (CDO)

B.

Privacy steering committee

C.

Information security steering committee

D.

Chief privacy officer (CPO)

Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?

A.

Perform a business impact analysis (BIA).

B.

Implement remediation actions to mitigate privacy risk.

C.

Conduct a privacy Impact assessment (PIA).

D.

Create a system of records notice (SORN).

A project manager for a new data collection system had a privacy impact assessment (PIA) completed before the solution was designed. Once the system was released into production, an audit revealed personal data was being collected that was not part of the PIA What is the BEST way to avoid this situation in the future?

A.

Conduct a privacy post-implementation review.

B.

Document personal data workflows in the product life cycle

C.

Require management approval of changes to system architecture design.

D.

Incorporate privacy checkpoints into the secure development life cycle

Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?

A.

Integrating security and privacy control requirements into the development of risk scenarios

B.

Prioritizing privacy-related risk scenarios as part of enterprise risk management ERM) processes

C.

Using a top-down approach to develop privacy-related risk scenarios for the organization

D.

Assigning the data protection officer accountability for privacy protection controls

To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.

A.

general counsel.

B.

database administrator.

C.

business application owner

D.

chief information officer (CIO)

Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?

A.

Approving privacy impact assessments (PIAs)

B.

Validating the privacy framework

C.

Managing privacy notices provided to customers

D.

Establishing employee privacy rights and consent

Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?

A.

Processing flow controls

B.

Time-based controls

C.

Purpose limitation controls

D.

Integrity controls

An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?

A.

Provide periodic user awareness training on data encryption.

B.

Implement a data loss prevention (DLP) tool.

C.

Conduct regular control self-assessments (CSAs).

D.

Enforce annual attestation to policy compliance.

Which of the following should be done FIRST when performing a data quality assessment?

A.

Identify the data owner.

B.

Define data quality rules.

C.

Establish business thresholds-

D.

Assess completeness of the data inventory.