Question 61

A data processor that handles personal data tor multiple customers has decided to migrate its data warehouse to a third-party provider. What is the processor obligated to do prior to implementation?
  • Question 62

    Which of the following is a role PRIMARILY assigned to an internal data owner?
  • Question 63

    When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
  • Question 64

    Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
  • Question 65

    Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?