Isaca CDPSE - Certified Data Privacy Solutions Engineer
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?
Before executive leadership approves a new data privacy policy, it is MOST important to ensure:
Which of the following is the MOST important consideration when choosing a method for data destruction?
Which of the following is the BEST way to protect personal data in the custody of a third party?
Which of the following is MOST important to capture in the audit log of an application hosting personal data?
Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?
How can an organization BEST ensure its vendors are complying with data privacy requirements defined in their contracts?