Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPP-E All Questions

View all questions & answers for the CIPP-E exam

Exam CIPP-E topic 1 question 78 discussion

Actual exam question from IAPP's CIPP-E
Question #: 78
Topic #: 1
[All CIPP-E Questions]

Read the following steps:
Discover which employees are accessing cloud services and from which devices and apps
Lock down the data in those apps and devices
Monitor and analyze the apps and devices for compliance

Manage application life cycles -

Monitor data sharing -
An organization should perform these steps to do which of the following?

  • A. Pursue a GDPR-compliant Privacy by Design process.
  • B. Institute a GDPR-compliant employee monitoring process.
  • C. Maintain a secure Bring Your Own Device (BYOD) program.
  • D. Ensure cloud vendors are complying with internal data use policies.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ssourav
3 months, 4 weeks ago
Selected Answer: C
C. Maintain a secure Bring Your Own Device (BYOD) program. Explanation: A. Pursue a GDPR-compliant Privacy by Design process: While these steps can contribute to Privacy by Design, they are specifically focused on device and app management rather than a broader design process. B. Institute a GDPR-compliant employee monitoring process: These steps are more about securing and managing access rather than monitoring employees. C. Maintain a secure Bring Your Own Device (BYOD) program: The steps clearly align with the objectives of a BYOD program, ensuring that employee devices accessing company data and cloud services are secure and compliant. D. Ensure cloud vendors are complying with internal data use policies: This is more about vendor management rather than directly managing employee devices and apps.
upvoted 1 times
...
AhamedArshadKhan
4 months ago
Byod is the right answer
upvoted 1 times
...
zero46
11 months, 1 week ago
Selected Answer: C
Devices, monitoring compliance - BYOD
upvoted 3 times
...
drluvkashyap
1 year, 3 months ago
B is the right answer as The steps described in the question are all part of a secure BYOD program. A BYOD program allows employees to use their own devices for work purposes. This can be a convenient and cost-effective way for employees to work, but it also introduces security risks. To mitigate these risks, organizations need to implement a secure BYOD program. This includes steps such as: Discovering which employees are accessing cloud services and from which devices and apps. Locking down the data in those apps and devices. Monitoring and analyzing the apps and devices for compliance. Managing application life cycles. Monitoring data sharing.
upvoted 1 times
Cippe
1 year, 2 months ago
You are saying B is right but your explanation is pointing towards C
upvoted 6 times
...
...
pauldhug
1 year, 6 months ago
Selected Answer: B
B is the answer
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...