Question 16

Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
  • Question 17

    Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
  • Question 18

    Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
  • Question 19

    Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
  • Question 20

    Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?