Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 7 / 8
Total 247 questions

Which of the following practices BEST indicates an organization follows the data minimization principle?

A.

Data is pseudonymized when being backed up.

B.

Data is encrypted before storage.

C.

Data is only accessible on a need-to-know basis.

D.

Data is regularly reviewed tor its relevance

An organization is considering whether to expand its operations into additional international jurisdictions. After performing a privacy risk assessment, the organization decides not to begin operating in those jurisdictions. Which of the following BEST describes this type of risk response?

A.

Risk avoidance

B.

Risk reduction

C.

Risk acceptance

D.

Risk mitigation

Which of the following is MOST suitable for facilitating and reporting to senior management on the enterprise privacy posture over time?

A.

Enterprise metadata inventory

B.

Privacy impact assessment (PIA)

C.

Vulnerability assessment results

D.

Continuous monitoring dashboards

Which of the following is the BEST way to explain the difference between data privacy and data security?

A.

Data privacy is about data segmentation, while data security prevents unauthorized access.

B.

Data privacy protects the data subjects, while data security is about protecting critical assets.

C.

Data privacy stems from regulatory requirements, while data security focuses on consumer rights.

D.

Data privacy protects users from unauthorized disclosure, while data security prevents compromise.

Which of the following BEST mitigates the privacy risk associated with setting cookies on a website?

A.

Implementing impersonation

B.

Obtaining user consent

C.

Ensuring nonrepudiation

D.

Applying data masking

Which of the following is the BEST indication of a highly effective privacy training program?

A.

No privacy incidents have been reported in the last year

B.

HR has made privacy training an annual mandate for the organization

C.

Members of the workforce understand their roles in protecting data privacy

D.

Recent audits have no findings or recommendations related to data privacy

Which of the following is the BEST control to detect potential internal breaches of personal data?

A.

Data loss prevention (DLP) systems

B.

User behavior analytics tools

C.

Employee background Checks

D.

Classification of data

Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?

A.

Trusted zone

B.

Clean zone

C.

Raw zone

D.

Temporal zone

Critical data elements should be mapped to which of the following?

A.

Data process flow

B.

Business analytics

C.

Business taxonomy

D.

Privacy policy

Which of the following is the MOST important consideration for developing data retention requirements?

A.

Industry guidelines

B.

Cost-benefit analysis

C.

Data classification rules

D.

Applicable regulations