Properly configured databases and well-written website codes are the best protection against what online threat?
Correct Answer:
B
What is a mistake organizations make when establishing privacy settings during the development of applications?
Correct Answer:
D
A privacy engineer has been asked to review an online account login page. He finds there is no limitation on the number of invalid login attempts a user can make when logging into their online account.
What would be the best recommendation to minimize the potential privacy risk from this weakness?
Correct Answer:
B
After committing to a Privacy by Design program, which activity should take place first?
Correct Answer:
B
Which of the following statements is true regarding software notifications and agreements?
Correct Answer:
C