Question 1
When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
Question 2
When configuring information systems for the communication and transport of personal data, an organization should:
Question 3
Which of the following BEST represents privacy threat modeling methodology?
Question 4
Which of the following should be the FIRST consideration when conducting a privacy impact assessment (PIA)?
Question 5
Which of the following should be the FIRST consideration when selecting a data sanitization method?