Question 31
An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
Question 32
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
Question 33
Which of the following is MOST likely to present a valid use case for keeping a customer's personal data after contract termination?
Question 34
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is BEST used to identity and review the application's runtime modules?
Question 35
Which of the following provides the BEST assurance that a potential vendor is able to comply with privacy regulations and the organization's data privacy policy?