Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 8 / 8
Total 247 questions

Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?

A.

Private key exposure

B.

Poor patch management

C.

Lack of password complexity

D.

Out-of-date antivirus signatures

Which of the following MUST be available to facilitate a robust data breach management response?

A.

Lessons learned from prior data breach responses

B.

Best practices to obfuscate data for processing and storage

C.

An inventory of previously impacted individuals

D.

An inventory of affected individuals and systems

Which of the following approaches to incorporating privacy by design principles BEST ensures the privacy of personal information?

A.

Implementing the principles into the end-to-end data life cycle

B.

Including the principles in reactive data breach plans

C.

Embedding the principles into remediation data procedures

D.

Building the principles into final data product developments

Which of the following is the PRIMARY reason that organizations need to map the data flows of personal data?

A.

To assess privacy risks

B.

To evaluate effectiveness of data controls

C.

To determine data integration gaps

D.

To comply with regulations