Question 1

When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
  • Question 2

    When configuring information systems for the communication and transport of personal data, an organization should:
  • Question 3

    Which of the following BEST represents privacy threat modeling methodology?
  • Question 4

    Which of the following should be the FIRST consideration when conducting a privacy impact assessment (PIA)?
  • Question 5

    Which of the following should be the FIRST consideration when selecting a data sanitization method?