Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Isaca CDPSE Dumps

Page: 1 / 22
Total 218 questions

Certified Data Privacy Solutions Engineer Questions and Answers

Question 1

An organization has initiated a project to enhance privacy protections by improving its information security controls. Which of the following is the MOST useful action to help define the scope of the project?

Options:

A.

Review recent audit reports on the internal control environment

B.

Identify databases that contain personal data

C.

Identify databases that do not have encryption in place.

D.

Review proposed privacy rules that govern the processing of personal data

Question 2

Which of the following should be done FIRST when developing an organization-wide strategy to address data privacy risk?

Options:

A.

Obtain executive support.

B.

Develop a data privacy policy.

C.

Gather privacy requirements from legal counsel.

D.

Create a comprehensive data inventory.

Question 3

Which of the following is the BEST indication of an effective records management program for personal data?

Options:

A.

Archived data is used for future analytics.

B.

The legal department has approved the retention policy.

C.

All sensitive data has been tagged.

D.

A retention schedule is in place.

Question 4

Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?

Options:

A.

Limited functions and capabilities of a secured operating environment

B.

Monitored network activities for unauthorized use

C.

Improved data integrity and reduced effort for privacy audits

D.

Unlimited functionalities and highly secured applications

Question 5

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

Options:

A.

Server details of the hosting environment

B.

Last logins of privileged users

C.

Last user who accessed personal data

D.

Application error events

Question 6

Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?

Options:

A.

The application only stores data locally.

B.

The application shares personal information upon request.

C.

The application only stores data for 24 hours.

D.

The application requires consent before sharing locations.

Question 7

An increase in threats originating from endpoints is an indication that:

Options:

A.

network audit frequency should increase.

B.

network protection should be maintained remotely.

C.

extended detection and response should be installed.

D.

credential management should be implemented.

Question 8

Which of the following poses the GREATEST privacy risk for client-side application processing?

Options:

A.

Failure of a firewall protecting the company network

B.

An employee loading personal information on a company laptop

C.

A remote employee placing communication software on a company server

D.

A distributed denial of service attack (DDoS) on the company network

Question 9

From a privacy perspective, it is MOST important to ensure data backups are:

Options:

A.

encrypted.

B.

incremental.

C.

differential.

D.

pseudonymized

Question 10

Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?

Options:

A.

Perform a privacy risk audit.

B.

Conduct a privacy risk assessment.

C.

Validate a privacy risk attestation.

D.

Conduct a privacy risk remediation exercise.

Question 11

Which of the following is a PRIMARY element of application and software hardening?

Options:

A.

Vulnerability analysis

B.

Database configuration

C.

Code review

D.

Software repository

Question 12

Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?

Options:

A.

End users using weak passwords

B.

Organizations using weak encryption to transmit data

C.

Vulnerabilities existing in authentication pages

D.

End users forgetting their passwords

Question 13

Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?

Options:

A.

The system architecture is clearly defined.

B.

A risk assessment has been completed.

C.

Security controls are clearly defined.

D.

Data protection requirements are included.

Question 14

Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?

Options:

A.

Processing flow controls

B.

Time-based controls

C.

Purpose limitation controls

D.

Integrity controls

Question 15

Which of the following is the MOST important consideration to ensure privacy when using big data analytics?

Options:

A.

Maintenance of archived data

B.

Disclosure of how the data is analyzed

C.

Transparency about the data being collected

D.

Continuity with business requirements

Question 16

Which of the following scenarios should trigger the completion of a privacy impact assessment (PIA)?

Options:

A.

Updates to data quality standards

B.

New inter-organizational data flows

C.

New data retention and backup policies

D.

Updates to the enterprise data policy

Question 17

Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?

Options:

A.

Implement a data loss prevention (DLP) solution.

B.

Review historical privacy incidents in the organization.

C.

Monitor inbound and outbound communications.

D.

Perform an analysis of known threats.

Question 18

Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?

Options:

A.

It uses Transport Layer Security (TLS).

B.

It provides a secure connection on an insecure network

C.

It makes public key cryptography feasible.

D.

It contains schemes for revoking keys.

Question 19

Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?

Options:

A.

It increases system resiliency.

B.

It reduces external threats to data.

C.

It reduces exposure of data.

D.

It eliminates attack motivation for data.

Question 20

Which of the following helps define data retention time in a stream-fed data lake that includes personal data?

Options:

A.

Privacy impact assessments (PIAs)

B.

Data lake configuration

C.

Data privacy standards

D.

Information security assessments

Question 21

An organization is considering the use of remote employee monitoring software. Which of the following is the MOST important privacy consideration when implementing this solution?

Options:

A.

Data should be used to improve employee performance.

B.

Data should be retained per the organization's retention policy

C.

Data access should be restricted based on roles.

D.

Data analysis should be used to set staffing levels

Question 22

Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?

Options:

A.

Require data dictionaries from service providers that handle the organization's personal data.

B.

Outsource personal data processing to the same third party

C.

Require independent audits of the providers' data privacy controls

D.

Require service level agreements (SLAs) to ensure data integrity while safeguarding confidentiality

Question 23

A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?

Options:

A.

Discretionary access control (DAC)

B.

Attribute-based access control (ABAC)

C.

Provision-based access control (PBAC)

D.

Mandatory access control (MAC)

Question 24

An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content

viewed, and the time and duration of online activities. Which data protection principle is applied?

Options:

A.

System use requirements

B.

Data integrity and confidentiality

C.

Lawfulness and fairness

D.

Data use limitation

Question 25

Which of the following is the BEST way to ensure privacy considerations are included when working with vendors?

Options:

A.

Including privacy requirements in the request for proposal (RFP) process

B.

Monitoring privacy-related service level agreements (SLAS)

C.

Including privacy requirements in vendor contracts

D.

Requiring vendors to complete privacy awareness training

Question 26

An organization must de-identify its data before it is transferred to a third party Which of the following should be done FIRST?

Options:

A.

Encrypt the data at rest and in motion

B.

Remove the identifiers during the data transfer

C.

Determine the categories of personal data collected

D.

Ensure logging is turned on for the database

Question 27

Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?

Options:

A.

Review the privacy policy.

B.

Obtain independent assurance of current practices.

C.

Re-assess the information security requirements.

D.

Validate contract compliance.

Question 28

An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?

Options:

A.

Data tagging

B.

Data normalization

C.

Data mapping

D.

Data hashing

Question 29

Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?

Options:

A.

Conduct an audit.

B.

Report performance metrics.

C.

Perform a control self-assessment (CSA).

D.

Conduct a benchmarking analysis.

Question 30

Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?

Options:

A.

Source code review

B.

Security audit

C.

Bug bounty program

D.

Tabletop simulation

Question 31

Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?

Options:

A.

For the purpose of medical research

B.

A forthcoming campaign to win back customers

C.

A required retention period due to regulations

D.

Ease of onboarding when the customer returns

Question 32

Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?

Options:

A.

Whole disk encryption

B.

Asymmetric encryption

C.

Digital signature

D.

Symmetric encryption

Question 33

A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows

users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?

Options:

A.

Client-side device ID

B.

Data storage requirements

C.

Encryption of key data elements

D.

Data usage without consent

Question 34

A health organization experienced a breach of a database containing pseudonymized personal data. Which of the following should be of MOST concern to the IT privacy practitioner?

Options:

A.

The data may be re-identified.

B.

The data was proprietary.

C.

The data was classified as confidential.

D.

The data is subject to regulatory fines.

Question 35

An email opt-in form on a website applies to which privacy principle?

Options:

A.

Accuracy

B.

Consent

C.

Transparency

D.

Integrity

Question 36

Which cloud deployment model is BEST for an organization whose main objectives are to logically isolate personal data from other tenants and adopt custom privacy controls for the data?

Options:

A.

Community cloud

B.

Private cloud

C.

Hybrid cloud

D.

Public cloud

Question 37

Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?

Options:

A.

Tokenization

B.

Aggregation

C.

Anonymization

D.

Encryption

Question 38

A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?

Options:

A.

Industry best practice related to information security standards in each relevant jurisdiction

B.

Identity and access management mechanisms to restrict access based on need to know

C.

Encryption algorithms for securing customer personal data at rest and in transit

D.

National data privacy legislative and regulatory requirements in each relevant jurisdiction

Question 39

Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?

Options:

A.

The data is encrypted and a key is required to re-identify the data.

B.

Key fields are hidden and unmasking is required to access to the data.

C.

Names and addresses are removed but the rest of the data is left untouched.

D.

The data is transformed such that re-identification is impossible.

Question 40

Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?

Options:

A.

Mandatory access control

B.

Network segmentation

C.

Dedicated access system

D.

Role-based access control

Question 41

Which of the following is the MOST important privacy consideration for video surveillance in high security areas?

Options:

A.

Video surveillance recordings may only be viewed by the organization.

B.

Those affected must be informed of the video surveillance_

C.

There is no limitation for retention of this data.

D.

Video surveillance data must be stored in encrypted format.

Question 42

When is the BEST time during the secure development life cycle to perform privacy threat modeling?

Options:

A.

When identifying business requirements

B.

Early in the design phase

C.

During functional verification testing

D.

Prior to the production release

Question 43

Which of the following BEST mitigates the privacy risk associated with setting cookies on a website?

Options:

A.

Implementing impersonation

B.

Obtaining user consent

C.

Ensuring nonrepudiation

D.

Applying data masking

Question 44

Which of the following MUST be available to facilitate a robust data breach management response?

Options:

A.

Lessons learned from prior data breach responses

B.

Best practices to obfuscate data for processing and storage

C.

An inventory of previously impacted individuals

D.

An inventory of affected individuals and systems

Question 45

A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the

lender. Which fundamental data subject right does this process infringe upon?

Options:

A.

Right to restriction of processing

B.

Right to be informed

C.

Right not to be profiled

D.

Right to object

Question 46

Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?

Options:

A.

To reduce the risk of sensitive data breaches

B.

To meet the organization's security baseline

C.

To ensure technical security measures are effective

D.

To prevent possible identity theft

Question 47

Which of the following helps to ensure the identities of individuals in two-way communication are verified?

Options:

A.

Virtual private network (VPN)

B.

Transport Layer Security (TLS)

C.

Mutual certificate authentication

D.

Secure Shell (SSH)

Question 48

Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?

Options:

A.

Integrating security and privacy control requirements into the development of risk scenarios

B.

Prioritizing privacy-related risk scenarios as part of enterprise risk management ERM) processes

C.

Using a top-down approach to develop privacy-related risk scenarios for the organization

D.

Assigning the data protection officer accountability for privacy protection controls

Question 49

Which of the following should be done NEXT after a privacy risk has been accepted?

Options:

A.

Monitor the risk landscape for material changes.

B.

Determine the risk appetite With management.

C.

Adjust the risk rating to help ensure it is remediated

D.

Reconfirm the risk during the next reporting period

Question 50

Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?

Options:

A.

Understanding the data flows within the organization

B.

Implementing strong access controls on a need-to-know basis

C.

Anonymizing privacy data during collection and recording

D.

Encrypting the data throughout its life cycle

Question 51

Which of the following is MOST important to include in a data use policy?

Options:

A.

The requirements for collecting and using personal data

B.

The method used to delete or destroy personal data

C.

The reason for collecting and using personal data

D.

The length of time personal data will be retained

Question 52

Which of the following is a foundational goal of data privacy laws?

Options:

A.

Privacy laws are designed to protect companies' collection of personal data

B.

Privacy laws are designed to prevent the collection of personal data

C.

Privacy laws are designed to provide transparency for the collection of personal data

D.

Privacy laws are designed to give people rights over the collection of personal data

Question 53

Which of the following BEST represents privacy threat modeling methodology?

Options:

A.

Mitigating inherent risks and threats associated with privacy control weaknesses

B.

Systematically eliciting and mitigating privacy threats in a software architecture

C.

Reliably estimating a threat actor’s ability to exploit privacy vulnerabilities

D.

Replicating privacy scenarios that reflect representative software usage

Question 54

A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?

Options:

A.

De-identify all data.

B.

Develop a data dictionary.

C.

Encrypt all sensitive data.

D.

Perform data discovery.

Question 55

In which of the following should the data record retention period be defined and established?

Options:

A.

Data record model

B.

Data recovery procedures

C.

Data quality standard

D.

Data management plan

Question 56

Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?

Options:

A.

Online behavioral tracking

B.

Radio frequency identification (RFID)

C.

Website cookies

D.

Beacon-based tracking

Question 57

Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?

Options:

A.

It eliminates cryptographic key collision.

B.

It minimizes the risk if the cryptographic key is compromised.

C.

It is more practical and efficient to use a single cryptographic key.

D.

Each process can only be supported by its own unique key management process.

Question 58

Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?

Options:

A.

To identify controls to mitigate data privacy risks

B.

To classify personal data according to the data classification scheme

C.

To assess the risk associated with personal data usage

D.

To determine the service provider’s ability to maintain data protection controls

Question 59

Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?

Options:

A.

User acceptance testing (UAT)

B.

Patch management

C.

Software hardening

D.

Web application firewall (WAF)

Question 60

Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?

Options:

A.

Retargeting employees for awareness training after a social engineering attack

B.

Conducting a simulation exercise that requires participants to respond to a privacy incident

C.

Providing an interactive session on privacy risks at an organization-wide meeting

D.

Requiring employees to review the organization's privacy policy on an annual basis

Question 61

An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?

Options:

A.

Height, weight, and activities

B.

Sleep schedule and calorie intake

C.

Education and profession

D.

Race, age, and gender

Question 62

Which of the following is the BEST indication of a highly effective privacy training program?

Options:

A.

Members of the workforce understand their roles in protecting data privacy

B.

Recent audits have no findings or recommendations related to data privacy

C.

No privacy incidents have been reported in the last year

D.

HR has made privacy training an annual mandate for the organization_

Question 63

Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?

Options:

A.

Encrypt the data at rest.

B.

De-identify the data.

C.

Use a unique hashing algorithm.

D.

Require a digital signature.

Question 64

Which of the following is the MOST important privacy consideration when developing a contact tracing application?

Options:

A.

The proportionality of the data collected tor the intended purpose

B.

Whether the application can be audited for compliance purposes

C.

The creation of a clear privacy notice

D.

Retention period for data storage

Question 65

When choosing data sources to be used within a big data architecture, which of the following data attributes MUST be considered to ensure data is not aggregated?

Options:

A.

Accuracy

B.

Granularity

C.

Consistency

D.

Reliability

Page: 1 / 22
Total 218 questions