Which of the following deployed at an enterprise level will MOST effectively block malicious tracking of user Internet browsing?
정답:
Question No : 5
An organization is planning a new implementation for tracking consumer web browser activity .
Which of the following should be done FIRST?
정답:
Question No : 6
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
정답:
Question No : 8
An organization wants to ensure that endpoints are protected in line with the privacy policy .
Which of the following should be the FIRST consideration?
정답:
Question No : 9
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
정답:
Question No : 12
Which of the following is the BEST way to protect personal data in the custody of a third party?
정답: Explanation:
In GDPR parlance, organizations that use third-party service providers are often, but not always, considered data controllers, which are entities that determine the purposes and means of the processing of personal data, which can include directing third parties to process personal data on their behalf. The third parties that process data for data controllers are known as data processors.
Question No : 13
Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?
An organization is concerned with authorized individuals accessing sensitive personal
customer information to use for unauthorized purposes .
Which of the following technologies is the BEST choice to mitigate this risk?
정답:
Question No : 15
Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?