Exam Details

  • Exam Code
    :CDPSE
  • Exam Name
    :Certified Data Privacy Solutions Engineer
  • Certification
    :Isaca Certifications
  • Vendor
    :Isaca
  • Total Questions
    :221 Q&As
  • Last Updated
    :May 13, 2024

Isaca Isaca Certifications CDPSE Questions & Answers

  • Question 11:

    An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?

    A. Detecting malicious access through endpoints

    B. Implementing network traffic filtering on endpoint devices

    C. Managing remote access and control

    D. Hardening the operating systems of endpoint devices

  • Question 12:

    Which of the following is the best way to reduce the risk of compromised credentials when an organization allows employees to have remote access?

    A. Enable whole disk encryption on remote devices.

    B. Purchase an endpoint detection and response (EDR) tool.

    C. Implement multi-factor authentication.

    D. Deploy single sign-on with complex password requirements.

  • Question 13:

    Which of the following is the PRIMARY objective of privacy incident response?

    A. To ensure data subjects impacted by privacy incidents are notified.

    B. To reduce privacy risk to the lowest possible level

    C. To mitigate the impact of privacy incidents

    D. To optimize the costs associated with privacy incidents

  • Question 14:

    A migration of personal data involving a data source with outdated documentation has been approved by senior management. Which of the following should be done NEXT?

    A. Review data flow post migration.

    B. Ensure appropriate data classification.

    C. Engage an external auditor to review the source data.

    D. Check the documentation version history for anomalies.

  • Question 15:

    Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

    A. The user's ability to select, filter, and transform data before it is shared

    B. Umbrella consent for multiple applications by the same developer

    C. User consent to share personal data

    D. Unlimited retention of personal data by third parties

  • Question 16:

    A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?

    A. The third-party workspace is hosted in a highly regulated jurisdiction.

    B. Personal data could potentially be exfiltrated through the virtual workspace.

    C. The organization's products are classified as intellectual property.

    D. There is a lack of privacy awareness and training among remote personnel.

  • Question 17:

    Which of the following should be done FIRST to establish privacy by design when developing a contact-tracing application?

    A. Conduct a privacy impact assessment (PIA).

    B. Conduct a development environment review.

    C. Identify privacy controls for the application.

    D. Identify differential privacy techniques.

  • Question 18:

    Which of the following is the BEST approach to minimize privacy risk when collecting personal data?

    A. Use a third party to collect, store, and process the data.

    B. Collect data through a secure organizational web server.

    C. Collect only the data necessary to meet objectives.

    D. Aggregate the data immediately upon collection.

  • Question 19:

    Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?

    A. Processing flow controls

    B. Time-based controls

    C. Purpose limitation controls

    D. Integrity controls

  • Question 20:

    As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

    A. Identify sensitive unstructured data at the point of creation.

    B. Classify sensitive unstructured data.

    C. Identify who has access to sensitive unstructured data.

    D. Assign an owner to sensitive unstructured data.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Isaca exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CDPSE exam preparations and Isaca certification application, do not hesitate to visit our Vcedump.com to find your solutions here.