Which of the following deployed at an enterprise level will MOST effectively block malicious tracking of user Internet browsing?
A. Web application firewall (WAF)
B. Website URL blacklisting
C. Domain name system (DNS) sinkhole
D. Desktop antivirus software
Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?
A. Mandatory access control
B. Network segmentation
C. Dedicated access system
D. Role-based access control
A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?
A. Access to personal data is not strictly controlled in development and testing environments.
B. Complex relationships within and across systems must be retained for testing.
C. Personal data across the various interconnected systems cannot be easily identified.
D. Data masking tools are complex and difficult to implement.
Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?
A. Data masking
B. Data truncation
C. Data encryption
D. Data minimization
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
A. Data redaction
B. Data quality assurance (QA)
C. Irreversible disposal
D. Collection limitation
Which of the following helps to ensure the identities of individuals in two-way communication are verified?
A. Virtual private network (VPN)
B. Transport Layer Security (TLS)
C. Mutual certificate authentication
D. Secure Shell (SSH)
Which of the following MOST effectively protects against the use of a network sniffer?
A. Network segmentation
B. Transport layer encryption
C. An intrusion detection system (IDS)
D. A honeypot environment
Which of the following is the BEST indication of an effective records management program for personal data?
A. Archived data is used for future analytics.
B. The legal department has approved the retention policy.
C. All sensitive data has been tagged.
D. A retention schedule is in place.
An organization is concerned with authorized individuals accessing sensitive personal customer information to use for unauthorized purposes. Which of the following technologies is the BEST choice to mitigate this risk?
A. Email filtering system
B. Intrusion monitoring
C. Mobile device management (MDM)
D. User behavior analytics
Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?
A. The right to object
B. The right to withdraw consent
C. The right to access
D. The right to be forgotten
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Isaca exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CDPSE exam preparations and Isaca certification application, do not hesitate to visit our Vcedump.com to find your solutions here.