Question 31

Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?
  • Question 32

    When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
  • Question 33

    Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
  • Question 34

    Which of the following protocols BEST protects end-to-end communication of personal data?
  • Question 35

    Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?