Question 31

An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?
  • Question 32

    Which of the following helps to ensure the identities of individuals in two-way communication are verified?
  • Question 33

    Which of the following is MOST likely to present a valid use case for keeping a customer's personal data after contract termination?
  • Question 34

    An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is BEST used to identity and review the application's runtime modules?
  • Question 35

    Which of the following provides the BEST assurance that a potential vendor is able to comply with privacy regulations and the organization's data privacy policy?