Isaca CDPSE - Certified Data Privacy Solutions Engineer
Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?
Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?
Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?
An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?
Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?
When capturing browsing and purchase data from consumers visiting a corporate website more than once, which of the following metadata-based technologies is typically used to identify a consumer?
Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?
Which of the following is the MOST important attribute of a privacy policy?
Breach notification period