Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 5 / 8
Total 247 questions

Which of the following is the BEST way for senior management to verify the success of its commitment to privacy by design?

A.

Review the findings of an industry benchmarking assessment

B.

Identify trends in the organization's amount of compromised personal data

C.

Review the findings of a third-party privacy control assessment

D.

Identify trends in the organization's number of privacy incidents.

Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?

A.

Data masking

B.

Data truncation

C.

Data encryption

D.

Data minimization

Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?

A.

It eliminates cryptographic key collision.

B.

It minimizes the risk if the cryptographic key is compromised.

C.

It is more practical and efficient to use a single cryptographic key.

D.

Each process can only be supported by its own unique key management process.

Which of the following processes BEST enables an organization to maintain the quality of personal data?

A.

Implementing routine automatic validation

B.

Maintaining hashes to detect changes in data

C.

Encrypting personal data at rest

D.

Updating the data quality standard through periodic review

Which of the following is the MOST effective way to support organizational privacy awareness objectives?

A.

Funding in-depth training and awareness education for data privacy staff

B.

Implementing an annual training certification process

C.

Including mandatory awareness training as part of performance evaluations

D.

Customizing awareness training by business unit function

When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

A.

The key must be kept separate and distinct from the data it protects.

B.

The data must be protected by multi-factor authentication.

C.

The key must be a combination of alpha and numeric characters.

D.

The data must be stored in locations protected by data loss prevention (DLP) technology.

Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?

A.

Online behavioral tracking

B.

Radio frequency identification (RFID)

C.

Website cookies

D.

Beacon-based tracking

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Gaining consent when information is collected

B.

Publishing a privacy notice

C.

Mailing rights documentation to customers

D.

Distributing a privacy rights policy

Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?

A.

Processing flow controls

B.

Time-based controls

C.

Purpose limitation controls

D.

Integrity controls

The BEST way for a multinational organization to ensure the comprehensiveness of its data privacy policy is to perform an annual review of changes to privacy

regulations in.

A.

the region where the business IS incorporated.

B.

all jurisdictions where corporate data is processed.

C.

all countries with privacy regulations.

D.

all data sectors in which the business operates