Which of the following MOST effectively protects against the use of a network sniffer?
Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?
Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
Some organizations, typically those that manage large amounts of personal information related to employees, customers, or constituents, will employ a chief privacy officer (CPO). Some organizations have a CPO because applicable regulations such as the Gramm-Leach-Bliley Act (GLBA) require it. Other regulations such as the Health Information Portability and Accountability Act (HIPAA), the Fair Credit Reporting Act (FCRA), and the GLBA place a slate of responsibilities upon an organization that compels them to hire an executive responsible for overseeing compliance.
Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?
Which of the following BEST represents privacy threat modeling methodology?
Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
Which of the following system architectures BEST supports anonymity for data transmission?
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?