Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?
Which of the following system architectures BEST supports anonymity for data transmission?
Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?
Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?
Transport Layer Security (TLS) provides data integrity through:
Which of the following should be done NEXT after a privacy risk has been accepted?
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?
Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?