Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CDPSE - Certified Data Privacy Solutions Engineer

Page: 1 / 8
Total 247 questions

Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?

A.

Differential privacy

B.

Secure multiparty computation

C.

Pseudonymization

D.

Masking of personal data

Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?

A.

Encrypt the data at rest.

B.

De-identify the data.

C.

Use a unique hashing algorithm.

D.

Require a digital signature.

An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?

A.

Low-level formatting

B.

Remote partitioning

C.

Degaussing

D.

Hammer strike

Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?

A.

Require an annual internal audit of SDLC processes.

B.

Include qualified application security personnel as part of the process.

C.

Ensure comprehensive application security testing immediately prior to release.

D.

Require an annual third-party audit of new client software solutions.

Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?

A.

Conduct a privacy impact assessment (PIA).

B.

Conduct a development environment review.

C.

Identify privacy controls for the application.

D.

Identify differential privacy techniques.

An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?

A.

Provide periodic user awareness training on data encryption.

B.

Implement a data loss prevention (DLP) tool.

C.

Conduct regular control self-assessments (CSAs).

D.

Enforce annual attestation to policy compliance.

Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?

A.

To reduce the risk of sensitive data breaches

B.

To meet the organization's security baseline

C.

To ensure technical security measures are effective

D.

To prevent possible identity theft

When capturing browsing and purchase data from consumers visiting a corporate website more than once, which of the following metadata-based technologies is typically used to identify a consumer?

A.

Supercookie

B.

HTTP cookie

C.

Server cookie

D.

Flash cookie

Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?

A.

Skills training programs

B.

Awareness campaigns

C.

Performance evaluations

D.

Code of conduct principles

Which of the following is the MOST important attribute of a privacy policy?

    Breach notification period

A.

Data retention period

B.

Transparency

C.

Language localization