Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 1 / 7
Total 218 questions

Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?

A.

Processing flow controls

B.

Time-based controls

C.

Purpose limitation controls

D.

Integrity controls

Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?

A.

Observed data

B.

Inferred data

C.

Derived data

D.

Provided data

Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?

A.

Develop a data migration plan.

B.

Conduct a legitimate interest analysis (LIA).

C.

Perform a privacy impact assessment (PIA).

D.

Obtain consent from data subjects.

Which of the following should be considered personal information?

A.

Biometric records

B.

Company address

C.

University affiliation

D.

Age

Which of the following helps to ensure the identities of individuals in a two-way communication are verified?

A.

Virtual private network (VPN)

B.

Secure Shell (SSH)

C.

Transport Layer Security (TLS)

D.

Mutual certificate authentication

A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?

A.

Review data flow post migration.

B.

Ensure appropriate data classification.

C.

Engage an external auditor to review the source data.

D.

Check the documentation version history for anomalies.

Which of the following system architectures BEST supports anonymity for data transmission?

A.

Client-server

B.

Plug-in-based

C.

Front-end

D.

Peer-to-peer

A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?

A.

Industry best practice related to information security standards in each relevant jurisdiction

B.

Identity and access management mechanisms to restrict access based on need to know

C.

Encryption algorithms for securing customer personal data at rest and in transit

D.

National data privacy legislative and regulatory requirements in each relevant jurisdiction

Which of the following should be done NEXT after a privacy risk has been accepted?

A.

Monitor the risk landscape for material changes.

B.

Determine the risk appetite With management.

C.

Adjust the risk rating to help ensure it is remediated

D.

Reconfirm the risk during the next reporting period

Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?

A.

Access is logged on the virtual private network (VPN).

B.

Multi-factor authentication is enabled.

C.

Active remote access is monitored.

D.

Access is only granted to authorized users.