Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 5 / 7
Total 218 questions

Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?

A.

Degaussing the drive

B.

Factory resetting the drive

C.

Crypto-shredding the drive

D.

Reformatting the drive

An increase in threats originating from endpoints is an indication that:

A.

network audit frequency should increase.

B.

network protection should be maintained remotely.

C.

extended detection and response should be installed.

D.

credential management should be implemented.

What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?

A.

Cross-border data transfer

B.

Support staff availability and skill set

C.

User notification

D.

Global public interest

Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?

A.

Implement a data loss prevention (DLP) solution.

B.

Review historical privacy incidents in the organization.

C.

Monitor inbound and outbound communications.

D.

Perform an analysis of known threats.

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Gaining consent when information is collected

B.

Publishing a privacy notice

C.

Mailing rights documentation to customers

D.

Distributing a privacy rights policy

Which of the following is the MOST important consideration when writing an organization’s privacy policy?

A.

Using a standardized business taxonomy

B.

Aligning statements to organizational practices

C.

Ensuring acknowledgment by the organization’s employees

D.

Including a development plan for personal data handling

Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?

A.

Mandatory access control

B.

Network segmentation

C.

Dedicated access system

D.

Role-based access control

An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities. Which data protection principle is applied?

A.

Data integrity and confidentiality

B.

System use requirements

C.

Data use limitation

D.

Lawfulness and fairness

Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?

A.

To comply with consumer regulatory requirements

B.

To establish privacy breach response procedures

C.

To classify personal data

D.

To understand privacy risks

Which of the following is a foundational goal of data privacy laws?

A.

Privacy laws are designed to protect companies' collection of personal data

B.

Privacy laws are designed to prevent the collection of personal data

C.

Privacy laws are designed to provide transparency for the collection of personal data

D.

Privacy laws are designed to give people rights over the collection of personal data