Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 6 / 8
Total 247 questions

Which of the following is MOST important when developing an organizational data privacy program?

A.

Obtaining approval from process owners

B.

Profiling current data use

C.

Following an established privacy framework

D.

Performing an inventory of all data

Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?

A.

Implementing automated data discovery and classification tools

B.

Implementing an internal solution to allow for inventory updates

C.

Developing and conducting periodic manual audits of all data assets

D.

Relying on each department to update data records quarterly

Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?

A.

Offline backup availability

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Online backup frequency

What type of personal information can be collected by a mobile application without consent?

A.

Full name

B.

Geolocation

C.

Phone number

D.

Accelerometer data

Which of the following is the MOST important consideration when writing an organization’s privacy policy?

A.

Using a standardized business taxonomy

B.

Aligning statements to organizational practices

C.

Ensuring acknowledgment by the organization’s employees

D.

Including a development plan for personal data handling

Which of the following outputs of a privacy audit is MOST likely to trigger remedial action?

A.

Deficiencies in how personal data is shared with third parties

B.

Recommendations to optimize current privacy policy

C.

Identification of uses of sensitive personal data

D.

Areas of focus for privacy training

Which of the following is the MOST important privacy consideration when developing a contact tracing application?

A.

The proportionality of the data collected tor the intended purpose

B.

Whether the application can be audited for compliance purposes

C.

The creation of a clear privacy notice

D.

Retention period for data storage

Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?

A.

Access is logged on the virtual private network (VPN).

B.

Multi-factor authentication is enabled.

C.

Active remote access is monitored.

D.

Access is only granted to authorized users.

Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?

A.

Providing system engineers the ability to search and retrieve data

B.

Allowing individuals to have direct access to their data

C.

Allowing system administrators to manage data access

D.

Establishing a data privacy customer service bot for individuals

Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?

A.

APIs are costly to assess and monitor.

B.

API keys could be stored insecurely.

C.

APIs are complex to build and test

D.

APIS could create an unstable environment