Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?
Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?
Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?
Which of the following system architectures BEST supports anonymity for data transmission?
Which of the following is the MOST important consideration to ensure privacy when using big data analytics?
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
Which of the following is the BEST practice to protect data privacy when disposing removable backup media?
An online retail company is trying to determine how to handle users’ data if they unsubscribe from marketing emails generated from the website. Which of the following is the BEST approach for handling personal data that has been restricted?
Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
Which of the following should be the FIRST consideration when selecting a data sanitization method?
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
Which of the following is the BEST indication of an effective records management program for personal data?
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
Which of the following deployed at an enterprise level will MOST effectively block malicious tracking of user Internet browsing?
When configuring information systems for the communication and transport of personal data, an organization should:
Which of the following processes BEST enables an organization to maintain the quality of personal data?
During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?
The MOST effective way to incorporate privacy by design principles into applications is to include privacy requirements in.
What type of personal information can be collected by a mobile application without consent?
Which of the following is the MOST important attribute of a privacy policy?
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?
Which of the following is MOST important when developing an organizational data privacy program?
Which of the following should be used to address data kept beyond its intended lifespan?
Which of the following is the BEST way for senior management to verify the success of its commitment to privacy by design?
Which of the following should be the FIRST consideration when conducting a privacy impact assessment (PIA)?
Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?
Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?
Which of the following is the BEST way to reduce the risk of compromise when transferring personal information using email?
What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
Which of the following is the MOST important privacy consideration when developing a contact tracing application?
Which of the following is the BEST indication of a highly effective privacy training program?
Which of the following is the GREATEST benefit of adopting data minimization practices?
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is
BEST used to identity and review the application's runtime modules?
An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?
Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?