CDPSE-Ippo
|
|
Título del Test:
![]() CDPSE-Ippo Descripción: CDPSE examen de simulacion para la preparacion de CDPSE |



| Comentarios |
|---|
NO HAY REGISTROS |
|
Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?. Implement a virtual private network (VPN) tool. Enforce multi-factor authentication for remote access. Evaluate the impact resulting from this change. Revisit the current remote working policies. Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?. Applicable privacy legislation. Applicable control frameworks. Type of data being processed. Available technology platforms. An organization is considering the use of generative AI to create realistic marketing content, such as personalized product descriptions. Which of the following is the MOST important privacy consideration when using generative AI for marketing purposes?. The potential for bias in the generated content. Hallucinations resulting from the use of large customer datasets. The inadvertent disclosure of sensitive information in the generated content. The lack of transparency around the inner workings of the generative AI model. Which of the following outputs of a privacy audit is MOST likely to trigger remedial action?. Recommendations to optimize current privacy policy. Identification of uses of sensitive personal data. Deficiencies in how personal data is shared with third parties. Areas of focus for privacy training. When data processing is performed at a third-party data center, ownership of the risk PRIMARILY rests with the: data controller. data scientist. data custodian. data processor. An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?. Implement a data loss prevention (DLP) tool. Provide periodic user awareness training on data encryption. Enforce annual attestation to policy compliance. Conduct regular control self-assessments (CSAs). When capturing browsing and purchase data from consumers visiting a corporate website more than once, which of the following metadata-based technologies is typically used to identify a consumer?. Supercookie. Server cookie. Flash cookie. HTTP cookie. Which of the following BEST helps to determine appropriate access privileges for an application containing customer personal data?. Data classification. RACI charts. Access control lists. Data catalog. What solution set should an organization implement to BEST ensure its data privacy activities are being centralized. Cloud access security broker (CASB) tools. Data loss prevention (DLP) software. Encryption key management software. Governance, risk, and compliance (GRC) tools. A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?. Develop a data dictionary. De-identify all data. Encrypt all sensitive data. Perform data discovery. An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?. Managing remote access and control. Hardening the operating systems of endpoint devices. Implementing network traffic filtering on endpoint devices. Detecting malicious access through endpoints. Using hash values With stored personal data BEST enables an organization to. Tag the data with classification information. Protect against unauthorized access. Detect changes to the data. Ensure data indexing performance. Which of the following is the BEST solution for storing both non-relational and relational personal data from Internet of Things (IoT) devices, web sites, and mobile applications?. Block storage. Data lake. Blockchain. Data warehouse. Which of the following should be reviewed FIRST as part of an audit of controls implemented to mitigate data privacy risk. Security impact assessment. Privacy policies and procedures. Privacy impact assessment (PIA). Privacy risk and control framework. Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?. The application shares personal information upon request. The application only stores data locally. The application requires consent before sharing locations. The application only stores data for 24 hours. Which of the following techniques BEST protects the privacy of personal data accessed via system endpoints?. Intrusion detection system (IDS). Normalization. Encryption. Endpoint detection and response (EDR). An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is BEST used to identity and review the application's runtime modules?. Software composition analysis. Dynamic application security testing (DAST). Static application security testing (SAST). Regression testing. An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?. Data mapping. Data hashing. Data tagging. Data normalization. Information should only be considered personal information if it: Relates directly or indirectly to an individual. is classified as sensitive and confidential. appears in a digital or electronic format. is objectively accurate or verifiable. An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy. Encrypt data at rest. Anonymize personal data. Implement strong access controls. Discontinue the creation of profiles. Which of the following BEST ensures an organization's data retention requirements will be met in the public cloud environment?. Automated data deletion schedules. Data classification schemes. Service level agreements (SLAs). Cloud vendor agreements. An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?. Conduct a privacy impact assessment (PIA). Obtain consent from the organization’s clients. Review and update the cookie policy. Seek approval from regulatory authorities. Which of the following is the FIRST step to protect data subject privacy when planning the deployment of a public monitoring system?. Draft a privacy breach response plan. Conduct a privacy impact assessment (PIA). Inform the public of the project. Inform data protection authorities. Which of the following is MOST important to ensure when reviewing strategic customer decisions driven by predictive AI?. Creativity levels are lowered to reduce hallucinations. Results are verified by a human in the loop. The speed of models can be leveraged to expedite business decisions. The organization is using a private large language model (LLM). To ensure security when accessing personal data from a corporate website, which of the following is a prerequisite to implementing Hypertext Transfer Protocol Secure (HTTPS)?. Load balancer. Virtual private network (VPN). Firewall. Transport Layer Security (TLS). The BEST way to ensure the integrity of an organization's data is to log and review which of the following?. Network access. Data modifications. Patch updates. Data types. Which of the following is the MOST important privacy consideration for video surveillance in high security areas?. Those affected must be informed of the video surveillance. Video surveillance recordings may only be viewed by the organization. There is no limitation for retention of this data. Video surveillance data must be stored in encrypted format. Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?. Provided data. Derived data. Inferred data. Observed data. Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?. Create a system of records notice (SORN). Perform a business impact analysis (BIA). Implement remediation actions to mitigate privacy risk. Conduct a privacy impact assessment (PIA). Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?. Establishing a data privacy customer service bot for individuals. Allowing system administrators to manage data access. Allowing individuals to have direct access to their data. Providing system engineers the ability to search and retrieve data. An organization must de-identify its data before it is transferred to a third party. Which of the following should be done FIRST?. Ensure logging is turned on for the database. Determine the categories of personal data collected. Remove the identifiers during the data transfer. Encrypt the data at rest and in motion. Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?. Conduct a legitimate interest analysis (LIA). Perform a privacy impact assessment (PIA). Develop a data migration plan. Obtain consent from data subjects. Which of the following should an organization do FIRST to ensure it can respond to all data subject access requests in a timely manner?. Create a policy for handling access requests. Invest in a platform to automate data review. Understand the data in its possession. Confirm what is required for disclosure. An organization wants to change the originally specified purpose of collected personal data. What must be done NEXT?. Notify data protection authorities. Update the enterprise data architecture. Revise the privacy notice. Obtain consent from data subjects. A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?. Data usage without consent. Encryption of key data elements. Client-side device ID. Data storage requirements. Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?. Encrypt all data used by the application. Implement a data loss prevention (DLP) system. Capture the application’s authentication logs. Use only the data required by the application. Which privacy-enhancing technology (PET) BEST enables third parties to process and manipulate data in its encrypted form?. Federated learning. Homomorphic encryption. Secure enclaves. End-to-end encryption. Which of the following strategies BEST mitigates the risks associated with exploiting the capabilities of generative AI for cyberattacks?. Reducing the use of generative AI to minimize risks. Implementing controls to prevent hallucinations. Implementing robust data validation techniques. Promoting generative AI awareness campaigns. Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?. Tabletop simulation. Security audit. Source code review. Bug bounty program. Which of the following is MOST important to capture in the audit log of an application hosting personal data?. Application error events. Last user who accessed personal data. Server details of the hosting environment. Last logins of privileged users. Which of the following characteristics of a cloud service provider (CSP) poses the GREATEST privacy-related compliance risk?. Resources are allocated from geographically dispersed locations. CSP contract terms rarely agree to right-to-audit clauses. Resources are provisioned as self-service without interaction with the CSP. Compliance-related training materials are developed without direct input from clients. An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?. Historical security incidents. Asset classification scheme. Database administration audit logs. Penetration test results. Which of the following is the MOST important consideration for developing data retention requirements?. Data classification rules. Industry guidelines. Applicable regulations. Cost-benefit analysis. Which of the following is the MOST effective way to support organizational privacy awareness objectives?. Funding in-depth training and awareness education for data privacy staff. Including mandatory awareness training as part of performance evaluations. Customizing awareness training by business unit function. Implementing an annual training certification process. Which of the following processes BEST enables an organization to maintain the quality of personal data?. Encrypting personal data at rest. Implementing routine automatic validation. Maintaining hashes to detect changes in data. Updating the data quality standard through periodic review. Which of the following is a privacy-enhancing technology (PET)?. Synthetic data generator. Usage of low code platforms. Scalability planning solution. Data normalization software. Which of the following practices BEST indicates an organization follows the data minimization principle?. Data is pseudonymized when being backed up. Data is regularly reviewed tor its relevance. Data is encrypted before storage. Data is only accessible on a need-to-know basis. Which of the following is the BEST approach for an organization looking to share privacy risk?. Signing contracts with third parties accessing personal information. Engaging a third-party audit firm. Implementing privacy notice and consent mechanisms. Implementing service level agreements (SLAs). Which of the following is the MOST important privacy consideration when selecting a system architecture for a human resources information system?. Compliance requirements for system monitoring. IT requirements for system maintenance and support. Regulatory requirements for data protection. Business requirements for system functionality. Which of the following BEST mitigates the privacy risk associated with setting cookies on a website?. Implementing impersonation. Obtaining user consent. Applying data masking. Ensuring nonrepudiation. Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?. Names and addresses are removed but the rest of the data is left untouched. The data is transformed such that re-identification is impossible. Key fields are hidden and unmasking is required to access to the data. The data is encrypted and a key is required to re-identify the data. Which of the following is the PRIMARY reason asset management is important to a privacy program?. It ensures employees are working from assigned locations. It enables data to be stored on approved resources. It ensures data is deleted when an employee resigns. It enables effective incident response. What is the BEST method for protecting data transmissions to devices in the field?. Application level authentication. Multi-factor authentication. Transport Layer Security (TLS). Hypertext Transfer Protocol Secure (HTTPS). Which of the following should be done FIRST when creating specialized training for employees with key duties to protect personal data?. Define the roles, responsibilities, and required skills based on job descriptions. Develop metrics to define and measure a successful training program. Identify the key internal and external threats to data protection. Benchmark existing training programs against industry standards. Which of the following is MOST useful for understanding an organization’s approach towards privacy compliance?. Privacy awareness training. Data privacy policies. Privacy audit reports. Data classifications. Which of the following should be done FIRST before an organization migrates data from an on-premise solution to a cloud-hosted solution that spans more than one jurisdiction?. Assess the organization’s exposure related to the migration. Encrypt the data while it is being migrated. Ensure data loss prevention (DLP) alerts are turned on. Conduct a penetration test of the hosted solution. Which of the following domains is the foundation for the execution of all other security and privacy operations?. Vulnerability management. Change management. Incident management. Asset management. Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?. A forthcoming campaign to win back customers. For the purpose of medical research. Ease of onboarding when the customer returns. A required retention period due to regulations. Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?. The extent of the service provider’s access to data has not been established. The service provider has denied the organization’s request for right to audit. Personal data stored on the cloud has not been anonymized. The data is stored in a region with different data protection requirements. An audit of an organization’s customer relationship management (CRM) system revealed duplicate user accounts for many customers. Which of the following should be the IT privacy practitioner's GREATEST concern?. Lack of data quality may result in increased audit findings. Critical communications may not reach the correct customer contacts. Duplicates may lead to increased customer inquiries and communication costs. Lack of data quality violates database integrity rules. In a system implementation project where production data must be used for testing, which of the following practices would MOST effectively protect customer data privacy?. Data classification. Data obfuscation. Data cleansing. Data minimization. Which of the following is MOST important when creating a data retention policy?. Requesting and obtaining board approval. Reviewing and updating current procedures. Identifying and classifying information assets. Identifying and scoping regulatory requirements. In which of the following scenarios would implementing a machine learning algorithm for anomaly detection raise data privacy concerns?. Evaluating employee behavior to identify potential fraud. Accessing personal information in audits. Determining employee email spam classification. Establishing benchmarks to identify outliers. An organization's privacy office is planning to conduct privacy awareness training for all staff. Which of the following topics is MOST important to include to help improve data privacy protection practices across the organization?. Identity access management (IAM). Data security monitoring management. Data classification management. Encryption key management. Which of the following should be the FIRST consideration when selecting a data sanitization method?. Storage type. Risk tolerance. Implementation cost. Industry standards. To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the. business application owner. general counsel. database administrator. chief information officer (CIO). Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?. Data processor. Privacy data analyst. Data owner. Data custodian. An organization must de-identify its data before it is transferred to a third party Which of the following should be done FIRST?. Ensure logging is turned on for the database. Encrypt the data at rest and in motion. Determine the categories of personal data collected. Remove the identifiers during the data transfer. Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?. Encrypt the data at rest. De-identify the data. Use a unique hashing algorithm. Require a digital signature. Which of the following is the BEST way to convert personal information to non-personal information?. Hashing. Anonymization. Pseudonymization. Encryption. A request for consent to collect personal data MUST: be limited to persons of legal age. be a condition or using the service. ask consumers to take steps to opt out. be separate from general terms and conditions. Who is ULTIMATELY accountable for the protection of personal data collected by an organization?. Data owner. Data custodian. Data protection officer. Data processor. Which of the following is the PRIMARY outcome of a privacy risk assessment?. Identified risk associated with data processing. Approved organizational risk appetite. Comprehensive privacy risk register. Defined risk mitigation strategy and plans. Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?. Processing flow controls. Purpose limitation controls. Time-based controls. Integrity controls. A technology company has just launched a mobile application for tracking health symptoms. This application is built on a mobile device technology stack that allows users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?. Data storage requirements. Data usage without consent. Encryption of key data elements. Client-side device ID. Which of the following MOST effectively protects against the use of a network sniffer?. Transport layer encryption. An intrusion detection system (IDS). Network segmentation. A honeypot environment. Transport Layer Security (TLS) provides data integrity through: asymmetric encryption of data sets. exchange of digital certificates. use of File Transfer Protocol (FTP). calculation of message digests. Which of the following should be done FIRST before an organization migrates data from an onpremise solution to a cloud-hosted solution that spans more than one jurisdiction?. Assess the organization's exposure related to the migration. Ensure data loss prevention (DLP) alerts are turned on. Encrypt the data while it is being migrated. Conduct a penetration test of the hosted solution. Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?. Obtain independent assurance of current practices. Validate contract compliance. Review the privacy policy. Re-assess the information security requirements. Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?. Monitoring and reviewing remote access logs. Regular physical and remote testing of the incident response plan. Regular testing of system backups. Compartmentalizing resource access. What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?. Conduct annual data privacy tabletop exercises. Hire a third party to perform a review of data privacy processes. Involve the privacy office in an organizational review of the incident response plan. Require security management to validate data privacy security practices. During which stage of the software development life cycle (SDLC) is it MOST critical to conduct a privacy impact assessment (PIA)?. Implementation. Testing. Development. Planning. Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?. Degaussing the drive. Crypto-shredding the drive. Reformatting the drive. Factory resetting the drive. Which of the following is the BEST approach when providing data subjects with access to their personal data?. Only allow users to edit data fields that are not derived from their personal information. Disable user profile data modification so there is no possibility to introduce mistakes. Create a profile page where users can view their information. Use an email address to automatically generate a unique ID. The identification of all data recipients in a privacy notice to website visitors reflects which privacy principle?. Accuracy. Integrity. Transparency. Consent. An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?. Low-level formatting. Degaussing. Remote partitioning. Hammer strike. A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?. Industry best practice related to information security standards in each relevant jurisdiction. Identity and access management mechanisms to restrict access based on need to know. National data privacy legislative and regulatory requirements in each relevant jurisdiction. Encryption algorithms for securing customer personal data at rest and in transit. Which of the following is the BEST source for forensic and analytic information when an organization is investigating suspicious activities from corporate-owned laptops?. Mobile device management (MDM). Device inventory and classification. Web application firewall (WAF). Endpoint detection and response (EDR). An organization identifies a risk that data subject access requests may not be managed within the regulatory timeline. The organization decides to outsource the data subject access request process to a third party. Which risk response is this an example of?. Risk transfer. Risk acceptance. Risk avoidance. Risk reduction. The BEST way for a multinational organization to ensure the comprehensiveness of its data privacy policy is to perform an annual review of changes to privacy regulations in. all jurisdictions where corporate data is processed. all countries with privacy regulations. all data sectors in which the business operates. the region where the business IS incorporated. Which of the following should be done FIRST when performing a data quality assessment?. Assess completeness of the data inventory. Establish business thresholds. Identify the data owner. Define data quality rules. Rounding and nulling are examples of which type of data de-identification function?. Hashing. Masking. Tokenization. Salting. Which of the following should be an information security manager's PRIMARY focus when migrating data between two dissimilar systems?. Developing automation to facilitate the migration. Ensuring data controls are maintained. Ensuring the integrity of system backups. Determining the amount of effort required. Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?. Web application firewall (WAF). Software hardening. User acceptance testing (UAT). Patch management. Which of the following helps to ensure the identities of individuals in a two-way communication are verified?. Secure Shell (SSH). Transport Layer Security (TLS). Mutual certificate authentication. Virtual private network (VPN). An organization is concerned with authorized individuals accessing sensitive personal customer information to use for unauthorized purposes. Which of the following technologies is the BEST choice to mitigate this risk?. Mobile device management (MDM). Email filtering system. User behavior analytics. Intrusion monitoring. Which of the following BEST enables an organization to manage privacy risk consistently over time?. Appointing the legal team to own privacy risk. Devising a structured approach to track risk mitigation activities. Including privacy risk in the enterprise risk profile. Inventorying all databases containing personal data. Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?. It eliminates cryptographic key collision. It minimizes the risk if the cryptographic key is compromised. Each process can only be supported by its own unique key management process. It is more practical and efficient to use a single cryptographic key. During which of the following system life cycle stages is it BEST to identify privacy controls for a machine learning (ML) model that consumes personal data?. Algorithm design. Functional testing. System deployment. System security testing. Critical data elements should be mapped to which of the following?. Business analytics. Data process flow. Business taxonomy. Privacy policy. Zero-knowledge proofs, secure multi-party computation, and homomorphic encryption are examples of: pseudonymization techniques. privacy by design concepts. Zero Trust security technologies. privacy-enhancing technologies (PETs). Which of the following poses the GREATEST privacy risk for client-side application processing?. A distributed denial of service attack (DDoS) on the company network. Failure of a firewall protecting the company network. A remote employee placing communication software on a company server. An employee loading personal information on a company laptop. Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?. Implement a data loss prevention (DLP) solution. Monitor inbound and outbound communications. Perform an analysis of known threats. Review historical privacy incidents in the organization. Which of the following controls BEST helps to maintain the integrity of customer information?. Logging. Encryption. Hashing. Access control lists. Which of the following is the FIRST step toward the effective management of personal data assets?. Establish data security controls. Minimize personal data. Analyze metadata. Create a personal data inventory. Which of the following is the PRIMARY consideration when managing consent for the use of an application targeted toward children? Verifying the date of birth. Verifying the date of birth for users who may be legally considered as minors. Using clear and consistent terminology in the terms of use and privacy notices. Verifying the approval of parents or guardians before processing personal data of children. Requiring children to obtain permission from parents or guardians before using the application. A health organization experienced a breach of a database containing pseudonymized personal data. Which of the following should be of MOST concern to the IT privacy practitioner?. The data is subject to regulatory fines. The data may be re-identified. The data was classified as confidential. The data was proprietary. In a contract for cloud services, whom should a cloud provider agree to notify in the event of a personal data breach?. Its client’s end users. Its client. Its client’s insurance carrier. Its client’s regulatory authority. Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?. It uses Transport Layer Security (TLS). It makes public key cryptography feasible. It provides a secure connection on an insecure network. It contains schemes for revoking keys. A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?. Determine what data is required by the application. Ensure the data loss prevention (DLP) tool is logging activity. De-identify all personal data in the database. Renew the encryption key to include the application. An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?. Historical security incidents. Penetration test results. Database administration audit logs. Asset classification scheme. Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?. The system architecture is clearly defined. Data protection requirements are included. Security controls are clearly defined. A risk assessment has been completed. Which of the following is MOST important to review when determining the data lineage of a data element?. Data flow. Data classification. Data storage location. Data retention schedule. To increase productivity, an organization is planning to implement movement tracking devices in the vehicles of field employees. Which of the following MUST be in place before installing the devices?. Location accuracy mechanisms. End user agreements. Bring your own device (BYOD) policy. Mobile device management (MDM). Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?. To establish privacy breach response procedures. To understand privacy risks. To classify personal data. To comply with consumer regulatory requirements. Which of the following is the GREATEST benefit of adopting data minimization practices?. Data retention efficiency is enhanced. The associated threat surface is reduced. Compliance requirements are met. Storage and encryption costs are reduced. Which of the following should be done FIRST when developing an organization-wide strategy to address data privacy risk?. Create a comprehensive data inventory. Gather privacy requirements from legal counsel. Develop a data privacy policy. Obtain executive support. Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?. It reduces external threats to data. It reduces exposure of data. It increases system resiliency. It eliminates attack motivation for data. an email opt-in form on a website applies to which privacy principle. Integrity. Transparency. Accuracy. consent. When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?. Volume of data stored. Privacy training for backup users. Data residing in another country. Data classification labeling. Consent MUST be obtained from a data subject when: data will be used for a purpose other than for which it was collected. collection includes de-identified personal data obtained from a public domain website. the data will be used to support the public interest. the organization processing the data has implemented separation of duties. Which of the following provides the MOST useful information when determining the scope of a privacy audit. Data flow mapping. Risk assessment results. Business processes. Previous audit reports. An organization's privacy office is planning to conduct privacy awareness training for all staff. Which of thefollowing topics is MOST important to include to help improve data privacy protection practices across the organization?. Data classification management. Data security monitoring management. Encryption key management. Identity access management (IAM). An organization is implementing database servers that will store personal data within a hosting environment. Which of the following is MOST important to incorporate to help ensure the privacy of the data?. System hardening. Device antivirus protection. Host-based firewall. Log monitoring. Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?. Data classification. Data collection. Data taxonomy. Data flows. Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?. Updates to data life cycle policy. Business impact due to the changes. Changes to current information architecture. Modifications to data quality standards. Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?. Out-of-date antivirus signatures. Lack of password complexity. Private Key exposure. Poor patch management. Which of the following is the BEST information to use as a framework to evaluate an organization's data management practices?. Benchmarking studies. Regulatory changes. Privacy policies and procedures. Capability maturity model. Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?. Detailed documentation of data privacy processes. Contract requirements for independent oversight. Strategic goals of the organization. Business objectives of senior leaders. A privacy practitioner has been asked to develop a privacy program for a client that has new privacy requirements due to its expansion into a new geographic region. Which of the following is the privacy practitioner's BEST course of action ?. Document privacy impacts on the organization. Update the operating privacy framework. Identify relevant regulatory requirements. Conduct employee training on the new requirements. Which of the following is MOST important to help determine the controls required to secure the servers that support a customer portal?. Control self-assessments (CSAs). Patch management software. Data classification policy. Configuration management tool. Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?. Active remote access is monitored. Multi-factor authentication is enabled. Access is only granted to authorized users. Access is logged on the virtual private network (VPN). Which of the following is the PRIMARY objective of privacy incident response?. To reduce privacy risk to the lowest possible level. To ensure data subjects impacted by privacy incidents are notified. To mitigate the impact of privacy incidents. To optimize the costs associated with privacy incidents. Which of the following can BEST identify failures of enterprise architecture (EA) to support privacy by design principles?. Penetration test. Privacy impact assessment (PIA). Control self-assessment (CSA). Independent audit process. When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?. The key must be kept separate and distinct from the data it protects. The data must be protected by multi-factor authentication. The key must be a combination of alpha and numeric characters. The data must be stored in locations protected by data loss prevention (DLP) technology. Which of the following BEST mitigates the risk of users not understanding the purpose of their data beingcollected?. Unlinkability. Encryption. Intervenability. Transparency. Which of the following is the BEST control to detect potential internal breaches of personal data?. User behavior analytics tools. Employee background checks. Classification of data. Data loss prevention (DLP) systems. |





