Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 4 / 8
Total 247 questions

Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?

A.

De-identifying the data to be analyzed

B.

Verifying the data subjects have consented to the processing

C.

Defining the intended objectives

D.

Ensuring proper data sets are used to train the models

Which of the following should be used to address data kept beyond its intended lifespan?

A.

Data minimization

B.

Data anonymization

C.

Data security

D.

Data normalization

An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities. Which data protection principle is applied?

A.

Data integrity and confidentiality

B.

System use requirements

C.

Data use limitation

D.

Lawfulness and fairness

In which of the following should the data record retention period be defined and established?

A.

Data record model

B.

Data recovery procedures

C.

Data quality standard

D.

Data management plan

Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?

A.

Input reference controls

B.

Access controls

C.

Input validation controls

D.

Reconciliation controls

Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?

A.

Subject matter expertise

B.

Type of media

C.

Regulatory compliance requirements

D.

Location of data

A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?

A.

Discretionary access control (DAC)

B.

Attribute-based access control (ABAC)

C.

Provision-based access control (PBAC)

D.

Mandatory access control (MAC)

An email opt-in form on a website applies to which privacy principle?

A.

Accuracy

B.

Consent

C.

Transparency

D.

Integrity

A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?

A.

Review data flow post migration.

B.

Ensure appropriate data classification.

C.

Engage an external auditor to review the source data.

D.

Check the documentation version history for anomalies.

Which of the following is the PRIMARY objective of privacy incident response?

A.

To ensure data subjects impacted by privacy incidents are notified.

B.

To reduce privacy risk to the lowest possible level

C.

To mitigate the impact of privacy incidents

D.

To optimize the costs associated with privacy incidents