Question 16
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
Question 17
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
Question 18
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
Question 19
Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?
Question 20
Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?