Q: 1
What should be the PRIMARY consideration of a multinational organization deploying a user and
entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which of the following is MOST important when designing application programming interfaces (APIs)
that enable mobile device applications to access personal data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection
against a man-in-the-middle attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which of the following activities would BEST enable an organization to identify gaps in its privacy
posture?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following BEST ensures an effective data privacy policy is implemented?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which of the following is MOST important to capture in the audit log of an application hosting
personal data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which of the following technologies BEST facilitates protection of personal data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which of the following is the BEST way for senior management to verify the success of its
commitment to privacy by design?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following is the BEST course of action to prevent false positives from data loss
prevention (DLP) tools?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2