Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 2 / 7
Total 218 questions

Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?

A.

Trusted zone

B.

Clean zone

C.

Raw zone

D.

Temporal zone

Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?

A.

Compartmentalizing resource access

B.

Regular testing of system backups

C.

Monitoring and reviewing remote access logs

D.

Regular physical and remote testing of the incident response plan

Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?

A.

Data masking

B.

Data truncation

C.

Data encryption

D.

Data minimization

An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?

A.

Data should be used to improve employee performance.

B.

Data should be retained per the organization's retention policy

C.

Data access should be restricted based on roles.

D.

Data analysis should be used to set staffing levels

Before executive leadership approves a new data privacy policy, it is MOST important to ensure:

A.

a training program is developed.

B.

a privacy committee is established.

C.

a distribution methodology is identified.

D.

a legal review is conducted.

Which of the following is the MOST important consideration when choosing a method for data destruction?

A.

Granularity of data to be destroyed

B.

Validation and certification of data destruction

C.

Time required for the chosen method of data destruction

D.

Level and strength of current data encryption

Which of the following is the BEST way to protect personal data in the custody of a third party?

A.

Have corporate counsel monitor privacy compliance.

B.

Require the third party to provide periodic documentation of its privacy management program.

C.

Include requirements to comply with the organization’s privacy policies in the contract.

D.

Add privacy-related controls to the vendor audit plan.

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

A.

Server details of the hosting environment

B.

Last user who accessed personal data

C.

Application error events

D.

Last logins of privileged users

Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?

A.

For the purpose of medical research

B.

A forthcoming campaign to win back customers

C.

A required retention period due to regulations

D.

Ease of onboarding when the customer returns

How can an organization BEST ensure its vendors are complying with data privacy requirements defined in their contracts?

A.

Review self-attestations of compliance provided by vendor management.

B.

Obtain independent assessments of the vendors’ data management processes.

C.

Perform penetration tests of the vendors’ data security.

D.

Compare contract requirements against vendor deliverables.