Isaca CDPSE - Certified Data Privacy Solutions Engineer
Which of the following is the MOST effective use of data flow diagrams when implementing a data privacy compliance program?
Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?
Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?
Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?
A staffing agency collects a broad scope of data on candidates (including education, credit, and medical history). This may violate which of the following data privacy principles?