Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?
During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?
Which of the following is the PRIMARY reason that organizations need to map the data flows of personal data?
What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?