Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CDPSE

CDPSE Certified Data Privacy Solutions Engineer Question and Answers

Question # 4

Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?

A.

The system architecture is clearly defined.

B.

A risk assessment has been completed.

C.

Security controls are clearly defined.

D.

Data protection requirements are included.

Full Access
Question # 5

What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?

A.

Cross-border data transfer

B.

Support staff availability and skill set

C.

User notification

D.

Global public interest

Full Access
Question # 6

Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?

A.

It eliminates cryptographic key collision.

B.

It minimizes the risk if the cryptographic key is compromised.

C.

It is more practical and efficient to use a single cryptographic key.

D.

Each process can only be supported by its own unique key management process.

Full Access
Question # 7

Which of the following BEST ensures an organization's data retention requirements will be met in the public cloud environment?

A.

Data classification schemes

B.

Automated data deletion schedules

C.

Cloud vendor agreements

D.

Service level agreements (SLAs)

Full Access
Question # 8

Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?

A.

Implementing automated data discovery and classification tools

B.

Implementing an internal solution to allow for inventory updates

C.

Developing and conducting periodic manual audits of all data assets

D.

Relying on each department to update data records quarterly

Full Access
Question # 9

Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?

A.

It uses Transport Layer Security (TLS).

B.

It provides a secure connection on an insecure network

C.

It makes public key cryptography feasible.

D.

It contains schemes for revoking keys.

Full Access
Question # 10

Which of the following protocols BEST protects end-to-end communication of personal data?

A.

Transmission Control Protocol (TCP)

B.

Transport Layer Security Protocol (TLS)

C.

Secure File Transfer Protocol (SFTP)

D.

Hypertext Transfer Protocol (HTTP)

Full Access
Question # 11

Which of the following is a foundational goal of data privacy laws?

A.

Privacy laws are designed to protect companies' collection of personal data

B.

Privacy laws are designed to prevent the collection of personal data

C.

Privacy laws are designed to provide transparency for the collection of personal data

D.

Privacy laws are designed to give people rights over the collection of personal data

Full Access
Question # 12

The purpose of consent tagging is to:

A.

Ensure users have given consent to use cookies

B.

Track and manage individuals’ consent preferences

C.

Log and track consent from a user visiting a website

D.

Request consent from a user visiting a website

Full Access
Question # 13

Which of the following technologies BEST facilitates protection of personal data?

A.

Data loss prevention (DLP) tools

B.

Data discovery and mapping tools

C.

Data log file monitoring tools

D.

Data profiling tools

Full Access
Question # 14

Which of the following practices BEST indicates an organization follows the data minimization principle?

A.

Data is pseudonymized when being backed up.

B.

Data is encrypted before storage.

C.

Data is only accessible on a need-to-know basis.

D.

Data is regularly reviewed tor its relevance

Full Access
Question # 15

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Gaining consent when information is collected

B.

Publishing a privacy notice

C.

Mailing rights documentation to customers

D.

Distributing a privacy rights policy

Full Access
Question # 16

Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?

A.

Chief data officer (CDO)

B.

Privacy steering committee

C.

Information security steering committee

D.

Chief privacy officer (CPO)

Full Access
Question # 17

Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?

A.

Implement a data loss prevention (DLP) solution.

B.

Review historical privacy incidents in the organization.

C.

Monitor inbound and outbound communications.

D.

Perform an analysis of known threats.

Full Access
Question # 18

Which of the following is the FIRST step toward the effective management of personal data assets?

A.

Establish data security controls.

B.

Analyze metadata.

C.

Create a personal data inventory

D.

Minimize personal data

Full Access
Question # 19

Which of the following MUST be available to facilitate a robust data breach management response?

A.

Lessons learned from prior data breach responses

B.

Best practices to obfuscate data for processing and storage

C.

An inventory of previously impacted individuals

D.

An inventory of affected individuals and systems

Full Access
Question # 20

Which of the following is MOST important to establish within a data storage policy to protect data privacy?

A.

Data redaction

B.

Data quality assurance (QA)

C.

Irreversible disposal

D.

Collection limitation

Full Access
Question # 21

Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?

A.

Encrypting APIs with the organization’s private key

B.

Requiring nondisclosure agreements (NDAs) when sharing APIs

C.

Restricting access to authorized users

D.

Sharing only digitally signed APIs

Full Access
Question # 22

Which of the following observations should be of MOST concern to an IT privacy practitioner during an evaluation of an organization’s privacy practices?

A.

Employee records are maintained on a shared drive

B.

Email is sent out without a data classification label

C.

Third-party service desk staff can view limited customer data

D.

Tokens for personally identifiable data are stored as database fields

Full Access
Question # 23

An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption

keys?

A.

Ensure key management responsibility is assigned to the privacy officer.

B.

Ensure the keys are stored in a remote server.

C.

Ensure the keys are stored in a cryptographic vault.

D.

Ensure all access to the keys is under dual control_

Full Access
Question # 24

Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?

A.

To comply with consumer regulatory requirements

B.

To establish privacy breach response procedures

C.

To classify personal data

D.

To understand privacy risks

Full Access
Question # 25

Which of the following is the MOST important consideration when processing personal data for an AI project?

A.

Establishing the appropriate legal basis before processing personal data

B.

Leveraging AI algorithms to inform data processing controls

C.

Implementing encryption techniques to protect personal data

D.

Collecting aggregated data to improve AI model performance

Full Access
Question # 26

Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?

A.

Differential privacy

B.

Secure multiparty computation

C.

Pseudonymization

D.

Masking of personal data

Full Access
Question # 27

Which of the following information would MOST likely be considered sensitive personal data?

A.

Mailing address

B.

Bank account login ID

C.

Ethnic origin

D.

Contact phone number

Full Access
Question # 28

Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?

A.

Disable location services.

B.

Disable Bluetooth services.

C.

Enable Trojan scanners.

D.

Enable antivirus for mobile devices.

Full Access
Question # 29

Which of the following is MOST important when developing an organizational data privacy program?

A.

Obtaining approval from process owners

B.

Profiling current data use

C.

Following an established privacy framework

D.

Performing an inventory of all data

Full Access
Question # 30

Which of the following is considered a privacy-enhancing technology (PET)?

A.

Public key infrastructure (PKI) for secure authentication

B.

Blockchain for decentralized data storage

C.

AI solutions that generate synthetic data

D.

Privacy-enhanced identity management systems

Full Access
Question # 31

A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is standardized across the entire organization?

A.

De-identify all data.

B.

Develop a data dictionary.

C.

Encrypt all sensitive data.

D.

Perform data discovery.

Full Access
Question # 32

Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?

A.

Retargeting employees for awareness training after a social engineering attack

B.

Conducting a simulation exercise that requires participants to respond to a privacy incident

C.

Providing an interactive session on privacy risks at an organization-wide meeting

D.

Requiring employees to review the organization's privacy policy on an annual basis

Full Access
Question # 33

Which of the following is a role PRIMARILY assigned to an internal data owner?

A.

Monitoring data retention periods

B.

Authorizing access rights

C.

Serving as primary contact with regulators

D.

Implementing appropriate technical controls

Full Access
Question # 34

Before executive leadership approves a new data privacy policy, it is MOST important to ensure:

A.

a training program is developed.

B.

a privacy committee is established.

C.

a distribution methodology is identified.

D.

a legal review is conducted.

Full Access
Question # 35

A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?

A.

Review data flow post migration.

B.

Ensure appropriate data classification.

C.

Engage an external auditor to review the source data.

D.

Check the documentation version history for anomalies.

Full Access
Question # 36

Which of the following is a PRIMARY element of application and software hardening?

A.

Vulnerability analysis

B.

Database configuration

C.

Code review

D.

Software repository

Full Access
Question # 37

A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows

users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?

A.

Client-side device ID

B.

Data storage requirements

C.

Encryption of key data elements

D.

Data usage without consent

Full Access
Question # 38

It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?

A.

Application design

B.

Requirements definition

C.

Implementation

D.

Testing

Full Access
Question # 39

Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?

A.

To educate data subjects regarding how personal data will be safeguarded

B.

To inform customers about the procedure to legally file complaints for misuse of personal data

C.

To provide transparency to the data subject on the intended use of their personal data

D.

To establish the organization's responsibility for protecting personal data during the relationship with the data subject

Full Access
Question # 40

A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?

A.

Discretionary access control (DAC)

B.

Attribute-based access control (ABAC)

C.

Provision-based access control (PBAC)

D.

Mandatory access control (MAC)

Full Access
Question # 41

An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is

BEST used to identity and review the application's runtime modules?

A.

Static application security testing (SAST)

B.

Dynamic application security testing (DAST)

C.

Regression testing

D.

Software composition analysis

Full Access
Question # 42

Which of the following would BEST ensure privacy when utilizing AI-based technologies?

A.

Encryption

B.

Pseudonymization

C.

Minimization

D.

Masking

Full Access
Question # 43

An organization is considering whether to expand its operations into additional international jurisdictions. After performing a privacy risk assessment, the organization decides not to begin operating in those jurisdictions. Which of the following BEST describes this type of risk response?

A.

Risk avoidance

B.

Risk reduction

C.

Risk acceptance

D.

Risk mitigation

Full Access
Question # 44

Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?

A.

Observed data

B.

Inferred data

C.

Derived data

D.

Provided data

Full Access
Question # 45

Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?

A.

Understanding the data flows within the organization

B.

Implementing strong access controls on a need-to-know basis

C.

Anonymizing privacy data during collection and recording

D.

Encrypting the data throughout its life cycle

Full Access
Question # 46

Which of the following has the GREATEST impact on the treatment of data within the scope of an organization's privacy policy?

A.

Data protection impact assessment (DPIA)

B.

Data flow diagram

C.

Data classification

D.

Data processing agreement

Full Access
Question # 47

Which of the following is the BEST control to detect potential internal breaches of personal data?

A.

Data loss prevention (DLP) systems

B.

User behavior analytics tools

C.

Employee background Checks

D.

Classification of data

Full Access
Question # 48

To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:

A.

training and testing requirements for employees handling personal data.

B.

roles and responsibilities of the person with oversights.

C.

metrics and outcomes recommended by external agencies.

D.

the scope and responsibilities of the data owner.

Full Access
Question # 49

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Distributing a privacy rights policy

B.

Mailing rights documentation to customers

C.

Publishing a privacy notice

D.

Gaining consent when information is collected

Full Access
Question # 50

When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

A.

The data must be protected by multi-factor authentication.

B.

The identifier must be kept separate and distinct from the data it protects.

C.

The key must be a combination of alpha and numeric characters.

D.

The data must be stored in locations protected by data loss prevention (DLP) technology.

Full Access
Question # 51

When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?

A.

Encryption of customer data

B.

Removal of customer data

C.

De-identification of customer data

D.

Destruction of customer data

Full Access
Question # 52

Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?

A.

Private key exposure

B.

Poor patch management

C.

Lack of password complexity

D.

Out-of-date antivirus signatures

Full Access
Question # 53

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

A.

Server details of the hosting environment

B.

Last logins of privileged users

C.

Last user who accessed personal data

D.

Application error events

Full Access
Question # 54

An email opt-in form on a website applies to which privacy principle?

A.

Accuracy

B.

Consent

C.

Transparency

D.

Integrity

Full Access
Question # 55

A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?

A.

Access to personal data is not strictly controlled in development and testing environments.

B.

Complex relationships within and across systems must be retained for testing.

C.

Personal data across the various interconnected systems cannot be easily identified.

D.

Data masking tools are complex and difficult to implement.

Full Access
Question # 56

Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?

A.

Privacy policy

B.

Network security standard

C.

Multi-factor authentication

D.

Virtual private network (VPN)

Full Access
Question # 57

When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?

A.

Co-regulatory

B.

Sectoral

C.

Comprehensive

D.

Self-regulatory

Full Access
Question # 58

Which of the following is the MOST important consideration when determining retention periods for personal data?

A.

Sectoral best practices for the industry

B.

Notice provided to customers during data collection

C.

Data classification standards

D.

Storage capacity available for retained data

Full Access
Question # 59

During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?

A.

Functional testing

B.

Development

C.

Production

D.

User acceptance testing (UAT)

Full Access
Question # 60

What is the BES T way for an organization to maintain the effectiveness of its privacy breach incident response plan?

    Require security management to validate data privacy security practices.

    Conduct annual data privacy tabletop exercises

A.

Hire a third party to perform a review of data privacy processes.

B.

Involve the privacy office in an organizational review of the incident response plan.

Full Access
Question # 61

A project manager for a new data collection system had a privacy impact assessment (PIA) completed before the solution was designed. Once the system was released into production, an audit revealed personal data was being collected that was not part of the PIA What is the BEST way to avoid this situation in the future?

A.

Conduct a privacy post-implementation review.

B.

Document personal data workflows in the product life cycle

C.

Require management approval of changes to system architecture design.

D.

Incorporate privacy checkpoints into the secure development life cycle

Full Access
Question # 62

Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?

A.

Compartmentalizing resource access

B.

Regular testing of system backups

C.

Monitoring and reviewing remote access logs

D.

Regular physical and remote testing of the incident response plan

Full Access
Question # 63

Which of the following is BEST used to validate compliance with agreed-upon service levels established with a third party that processes personal data?

A.

Key risk indicators (KRIs)

B.

Key performance indicators (KPIS)

C.

Industry benchmarks

D.

Contractual right to audit

Full Access
Question # 64

Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?

A.

Data custodian

B.

Privacy data analyst

C.

Data processor

D.

Data owner

Full Access
Question # 65

An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?

A.

Anonymize personal data.

B.

Discontinue the creation of profiles.

C.

Implement strong access controls.

D.

Encrypt data at rest.

Full Access
Question # 66

Which of the following is the BEST way to ensure privacy considerations are included when working with vendors?

A.

Including privacy requirements in the request for proposal (RFP) process

B.

Monitoring privacy-related service level agreements (SLAS)

C.

Including privacy requirements in vendor contracts

D.

Requiring vendors to complete privacy awareness training

Full Access
Question # 67

Which of the following MOST effectively protects against the use of a network sniffer?

A.

Network segmentation

B.

Transport layer encryption

C.

An intrusion detection system (IDS)

D.

A honeypot environment

Full Access
Question # 68

Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?

A.

Develop a data migration plan.

B.

Conduct a legitimate interest analysis (LIA).

C.

Perform a privacy impact assessment (PIA).

D.

Obtain consent from data subjects.

Full Access
Question # 69

A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?

A.

The third-party workspace is hosted in a highly regulated jurisdiction.

B.

Personal data could potentially be exfiltrated through the virtual workspace.

C.

The organization’s products are classified as intellectual property.

D.

There is a lack of privacy awareness and training among remote personnel.

Full Access
Question # 70

Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?

A.

Thick client desktop with virtual private network (VPN) connection

B.

Remote wide area network (WAN) links

C.

Thin Client remote desktop protocol (RDP)

D.

Site-to-site virtual private network (VPN)

Full Access
Question # 71

Which of the following is the BEST indication of an effective records management program for personal data?

A.

Archived data is used for future analytics.

B.

The legal department has approved the retention policy.

C.

All sensitive data has been tagged.

D.

A retention schedule is in place.

Full Access
Question # 72

Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?

A.

Set a unique static IP for the default network interface.

B.

Disable all wireless networking in the group policy.

C.

Reinstall the operating system and enable laptop encryption.

D.

Perform a full wipe and reimage of the laptops.

Full Access
Question # 73

An organization's work-from-home policy allows employees to access corporate IT assets remotely Which of the following controls is MOST important to mitigate the

risk of potential personal data compromise?

A.

Encryption of network traffic

B.

Intrusion prevention system (IPS)

C.

Firewall rules review

D.

Intrusion detection system (IOS)

Full Access
Question # 74

Which of the following helps define data retention time in a stream-fed data lake that includes personal data?

A.

Privacy impact assessments (PIAs)

B.

Data lake configuration

C.

Data privacy standards

D.

Information security assessments

Full Access