Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 6 / 7
Total 218 questions

Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?

A.

To identify controls to mitigate data privacy risks

B.

To classify personal data according to the data classification scheme

C.

To assess the risk associated with personal data usage

D.

To determine the service provider’s ability to maintain data protection controls

Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

A.

The user’s ability to select, filter, and transform data before it is shared

B.

Umbrella consent for multiple applications by the same developer

C.

User consent to share personal data

D.

Unlimited retention of personal data by third parties

When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

A.

The key must be kept separate and distinct from the data it protects.

B.

The data must be protected by multi-factor authentication.

C.

The key must be a combination of alpha and numeric characters.

D.

The data must be stored in locations protected by data loss prevention (DLP) technology.

Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?

A.

Encrypt the data at rest.

B.

De-identify the data.

C.

Use a unique hashing algorithm.

D.

Require a digital signature.

Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?

A.

Source code review

B.

Security audit

C.

Bug bounty program

D.

Tabletop simulation

Which of the following is the BEST way to ensure privacy considerations are included when working with vendors?

A.

Including privacy requirements in the request for proposal (RFP) process

B.

Monitoring privacy-related service level agreements (SLAS)

C.

Including privacy requirements in vendor contracts

D.

Requiring vendors to complete privacy awareness training

Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?

A.

The system architecture is clearly defined.

B.

A risk assessment has been completed.

C.

Security controls are clearly defined.

D.

Data protection requirements are included.

When choosing data sources to be used within a big data architecture, which of the following data attributes MUST be considered to ensure data is not aggregated?

A.

Accuracy

B.

Granularity

C.

Consistency

D.

Reliability

An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?

A.

Low-level formatting

B.

Remote partitioning

C.

Degaussing

D.

Hammer strike

Which of the following is the BEST way to address privacy concerns when an organization captures personal data from a third party through an open application

programming interface (API)?

A.

Develop a service level agreement (SLA) with the third party

B.

Implement encryption for the data transmission

C.

Obtain consent from the data subjects

D.

Review the specification document of the open API.