Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 4 / 7
Total 218 questions

In which of the following should the data record retention period be defined and established?

A.

Data record model

B.

Data recovery procedures

C.

Data quality standard

D.

Data management plan

When can data subjects be prohibited from withdrawing consent for processing their personal data?

A.

When the data is no longer necessary

B.

When the processing is unlawful

C.

When there is an absence of overriding legitimate grounds

D.

When the data is being archived in the public interest

A health organization experienced a breach of a database containing pseudonymized personal data. Which of the following should be of MOST concern to the IT privacy practitioner?

A.

The data may be re-identified.

B.

The data was proprietary.

C.

The data was classified as confidential.

D.

The data is subject to regulatory fines.

An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?

A.

Data archiving

B.

Data storage

C.

Data acquisition

D.

Data input

Who is ULTIMATELY accountable for the protection of personal data collected by an organization?

A.

Data processor

B.

Data owner

C.

Data custodian

D.

Data protection officer

Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?

A.

APIs are costly to assess and monitor.

B.

API keys could be stored insecurely.

C.

APIs are complex to build and test

D.

APIS could create an unstable environment

Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?

A.

Offline backup availability

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Online backup frequency

Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?

A.

Approving privacy impact assessments (PIAs)

B.

Validating the privacy framework

C.

Managing privacy notices provided to customers

D.

Establishing employee privacy rights and consent

Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?

A.

Private key exposure

B.

Poor patch management

C.

Lack of password complexity

D.

Out-of-date antivirus signatures

Which of the following is the BEST way to explain the difference between data privacy and data security?

A.

Data privacy is about data segmentation, while data security prevents unauthorized access.

B.

Data privacy protects the data subjects, while data security is about protecting critical assets.

C.

Data privacy stems from regulatory requirements, while data security focuses on consumer rights.

D.

Data privacy protects users from unauthorized disclosure, while data security prevents compromise.