Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
A. The system architecture is clearly defined.
B. A risk assessment has been completed.
C. Security controls are clearly defined.
D. Data protection requirements are included.
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
A. Trusted zone
B. Clean zone
C. Raw zone
D. Temporal zone
Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?
A. It increases system resiliency.
B. It reduces external threats to data.
C. It reduces exposure of data.
D. It eliminates attack motivation for data.
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
A. Conducting a PIA requires significant funding and resources.
B. PIAs need to be performed many times in a year.
C. The organization lacks knowledge of PIA methodology.
D. The value proposition of a PIA is not understood by management.
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
A. Height, weight, and activities
B. Sleep schedule and calorie intake
C. Education and profession
D. Race, age, and gender
Which of the following is the BEST way for an organization to gain visibility into its exposure to privacy-related vulnerabilities?
A. Review historical privacy incidents in the organization.
B. Monitor inbound and outbound communications.
C. Perform an analysis of known threats.
D. Implement a data loss prevention (DLP) solution.
An organization's new sales application asks for consent to collect consumer personal information. Which foundational privacy by design principle is this organization following?
A. Respecting user privacy
B. Maintaining visibility and transparency
C. Embedding privacy into system requirements
D. Ensuring end-to-end security
Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?
A. Require service level agreements (SLAs) to ensure data integrity while safeguarding confidentiality.
B. Require data dictionaries from service providers that handle the organization's personal data.
C. Outsource personal data processing to the same third party.
D. Require independent audits of the providers' data privacy controls.
Which of the following is the MOST important key management practice when deploying cryptography for protecting personal data?
A. Preventing users from using incorrect private keys
B. Protecting the confidentiality and authenticity of private keys
C. Preventing users from using incorrect public keys
D. Protecting the confidentiality and authenticity of public keys
Which of the following is the PRIMARY reason to allow data transfer between regions?
A. Data subjects give implicit consent for a contract or claim.
B. There is a legal basis of public interest.
C. Data transfer concerns a limited number of data subjects.
D. There are legitimate interests that override data subject rights.