Question 31
Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?
Question 32
When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
Question 33
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
Question 34
Which of the following protocols BEST protects end-to-end communication of personal data?
Question 35
Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?