Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 3 / 8
Total 247 questions

Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?

A.

Understanding the data flows within the organization

B.

Implementing strong access controls on a need-to-know basis

C.

Anonymizing privacy data during collection and recording

D.

Encrypting the data throughout its life cycle

Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?

A.

Conducting a PIA requires significant funding and resources.

B.

PIAs need to be performed many times in a year.

C.

The organization lacks knowledge of PIA methodology.

D.

The value proposition of a PIA is not understood by management.

Which of the following is the BEST approach to minimize privacy risk when collecting personal data?

A.

Use a third party to collect, store, and process the data.

B.

Collect data through a secure organizational web server.

C.

Collect only the data necessary to meet objectives.

D.

Aggregate the data immediately upon collection.

Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?

A.

Review the privacy policy.

B.

Obtain independent assurance of current practices.

C.

Re-assess the information security requirements.

D.

Validate contract compliance.

Which of the following helps to ensure the identities of individuals in two-way communication are verified?

A.

Virtual private network (VPN)

B.

Transport Layer Security (TLS)

C.

Mutual certificate authentication

D.

Secure Shell (SSH)

Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?

A.

Changes to current information architecture

B.

Updates to data life cycle policy

C.

Business impact due to the changes

D.

Modifications to data quality standards

Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?

A.

The organization lacks a hardware disposal policy.

B.

Emails are not consistently encrypted when sent internally.

C.

Privacy training is carried out by a service provider.

D.

The organization’s privacy policy has not been reviewed in over a year.

Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?

A.

It increases system resiliency.

B.

It reduces external threats to data.

C.

It reduces exposure of data.

D.

It eliminates attack motivation for data.

Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?

A.

Chief data officer (CDO)

B.

Privacy steering committee

C.

Information security steering committee

D.

Chief privacy officer (CPO)

Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?

A.

Require data dictionaries from service providers that handle the organization's personal data.

B.

Outsource personal data processing to the same third party

C.

Require independent audits of the providers' data privacy controls

D.

Require service level agreements (SLAs) to ensure data integrity while safeguarding confidentiality