Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 2 / 8
Total 247 questions

Which of the following is the MOST effective use of data flow diagrams when implementing a data privacy compliance program?

A.

Processing personal data with clarity and ease

B.

Illustrating where personal data resides in systems

C.

Mapping personal data at rest

D.

Identifying where personal data is in transit

Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?

A.

Define the mobile app privacy policy.

B.

Implement application hardening measures.

C.

Provide the app only through official app stores

D.

Conduct penetration testing

Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?

A.

Privacy policy

B.

Network security standard

C.

Multi-factor authentication

D.

Virtual private network (VPN)

Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?

A.

Perform a privacy risk audit.

B.

Conduct a privacy risk assessment.

C.

Validate a privacy risk attestation.

D.

Conduct a privacy risk remediation exercise.

Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?

A.

End users using weak passwords

B.

Organizations using weak encryption to transmit data

C.

Vulnerabilities existing in authentication pages

D.

End users forgetting their passwords

Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?

A.

Focus on developing a risk action plan based on audit reports.

B.

Focus on requirements with the highest organizational impact.

C.

Focus on global compliance before meeting local requirements.

D.

Focus on local standards before meeting global compliance.

Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?

A.

Develop a data migration plan.

B.

Conduct a legitimate interest analysis (LIA).

C.

Perform a privacy impact assessment (PIA).

D.

Obtain consent from data subjects.

Which of the following should be done NEXT after a privacy risk has been accepted?

A.

Monitor the risk landscape for material changes.

B.

Determine the risk appetite With management.

C.

Adjust the risk rating to help ensure it is remediated

D.

Reconfirm the risk during the next reporting period

Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?

A.

Integrating security and privacy control requirements into the development of risk scenarios

B.

Prioritizing privacy-related risk scenarios as part of enterprise risk management ERM) processes

C.

Using a top-down approach to develop privacy-related risk scenarios for the organization

D.

Assigning the data protection officer accountability for privacy protection controls

A staffing agency collects a broad scope of data on candidates (including education, credit, and medical history). This may violate which of the following data privacy principles?

A.

Data transparency

B.

Data localization

C.

Data minimization

D.

Data quality