Question 91

When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
  • Question 92

    Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?
  • Question 93

    Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
  • Question 94

    Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?
  • Question 95

    Which of the following is MOST likely to present a valid use case for keeping a customer's personal data after contract termination?