Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 3 / 7
Total 218 questions

Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?

A.

De-identifying the data to be analyzed

B.

Verifying the data subjects have consented to the processing

C.

Defining the intended objectives

D.

Ensuring proper data sets are used to train the models

Which of the following is the MOST important privacy consideration when developing a contact tracing application?

A.

The proportionality of the data collected tor the intended purpose

B.

Whether the application can be audited for compliance purposes

C.

The creation of a clear privacy notice

D.

Retention period for data storage

Which of the following is a role PRIMARILY assigned to an internal data owner?

A.

Monitoring data retention periods

B.

Authorizing access rights

C.

Serving as primary contact with regulators

D.

Implementing appropriate technical controls

Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?

A.

To educate data subjects regarding how personal data will be safeguarded

B.

To inform customers about the procedure to legally file complaints for misuse of personal data

C.

To provide transparency to the data subject on the intended use of their personal data

D.

To establish the organization's responsibility for protecting personal data during the relationship with the data subject

Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?

A.

The right to object

B.

The right to withdraw consent

C.

The right to access

D.

The right to be forgotten

An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?

A.

Height, weight, and activities

B.

Sleep schedule and calorie intake

C.

Education and profession

D.

Race, age, and gender

Which party should data subject contact FIRST if they believe their personal information has been collected and used without consent?

A.

Privacy rights advocate

B.

Outside privacy counsel

C.

Data protection authorities

D.

The organization’s chief privacy officer (CPO)

Which of the following should an organization do FIRST to ensure it can respond to all data subject access requests in a timely manner?

A.

Understand the data in its possession.

B.

Invest in a platform to automate data review

C.

Confirm what is required for disclosure.

D.

Create a policy for handling access request

Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?

A.

Set a unique static IP for the default network interface.

B.

Disable all wireless networking in the group policy.

C.

Reinstall the operating system and enable laptop encryption.

D.

Perform a full wipe and reimage of the laptops.

As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

A.

Identify sensitive unstructured data at the point of creation.

B.

Classify sensitive unstructured data.

C.

Identify who has access to sensitive unstructured data.

D.

Assign an owner to sensitive unstructured data.