Vcehome > Isaca > Isaca Certifications > CDPSE > CDPSE Online Practice Questions and Answers

CDPSE Online Practice Questions and Answers

Questions 4

Of the following, who should be PRIMARILY accountable for creating an organization's privacy management strategy?

A. Chief data officer (CDO)

B. Privacy steering committee

C. Information security steering committee

D. Chief privacy officer (CPO)

Browse 221 Q&As
Questions 5

Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?

A. End users using weak passwords

B. Organizations using weak encryption to transmit data

C. Vulnerabilities existing in authentication pages

D. End users forgetting their passwords

Browse 221 Q&As
Questions 6

Which of the following should be used to address data kept beyond its intended lifespan?

A. Data minimization

B. Data anonymization

C. Data security

D. Data normalization

Browse 221 Q&As
Questions 7

Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?

A. Compartmentalizing resource access

B. Regular testing of system backups

C. Monitoring and reviewing remote access logs

D. Regular physical and remote testing of the incident response plan

Browse 221 Q&As
Questions 8

A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?

A. De-identify all data.

B. Develop a data dictionary.

C. Encrypt all sensitive data.

D. Perform data discovery.

Browse 221 Q&As
Questions 9

Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?

A. The right to object

B. The right to withdraw consent

C. The right to access

D. The right to be forgotten

Browse 221 Q&As
Questions 10

Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

A. The user's ability to select, filter, and transform data before it is shared

B. Umbrella consent for multiple applications by the same developer

C. User consent to share personal data

D. Unlimited retention of personal data by third parties

Browse 221 Q&As
Questions 11

A data subject's ability to securely obtain and reuse personal data for their own purposes across different services is known as the right to:

A. data portability.

B. data sanitization.

C. data limitation.

D. data protection.

Browse 221 Q&As
Questions 12

Which of the following is the BEST example of risk-based data protection?

A. Data encryption

B. Data segmentation

C. Transit-layer encryption

D. Data partitioning

Browse 221 Q&As
Questions 13

An organization is designing a new human resources (HR) system. Which of the following should be implemented to BEST enable detection of unauthorized access to personal data?

A. Data loss prevention (DLP) solution

B. Security information and event management (SIEM) solution

C. Vulnerability scanning and management software

D. Web application firewall (WAF)

Browse 221 Q&As
Exam Code: CDPSE
Exam Name: Certified Data Privacy Solutions Engineer
Last Update: May 16, 2024
Questions: 221 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99