Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 7 / 7
Total 218 questions

Critical data elements should be mapped to which of the following?

A.

Data process flow

B.

Business analytics

C.

Business taxonomy

D.

Privacy policy

Which of the following helps to ensure the identities of individuals in two-way communication are verified?

A.

Virtual private network (VPN)

B.

Transport Layer Security (TLS)

C.

Mutual certificate authentication

D.

Secure Shell (SSH)

A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?

A.

The third-party workspace is hosted in a highly regulated jurisdiction.

B.

Personal data could potentially be exfiltrated through the virtual workspace.

C.

The organization’s products are classified as intellectual property.

D.

There is a lack of privacy awareness and training among remote personnel.

An organization's work-from-home policy allows employees to access corporate IT assets remotely Which of the following controls is MOST important to mitigate the

risk of potential personal data compromise?

A.

Encryption of network traffic

B.

Intrusion prevention system (IPS)

C.

Firewall rules review

D.

Intrusion detection system (IOS)

Which cloud deployment model is BEST for an organization whose main objectives are to logically isolate personal data from other tenants and adopt custom privacy controls for the data?

A.

Community cloud

B.

Private cloud

C.

Hybrid cloud

D.

Public cloud