ISACA CDPSE Certified Data Privacy Solutions Engineer Online Training
ISACA CDPSE Online Training
The questions for CDPSE were last updated at Apr 22,2024.
- Exam Code: CDPSE
- Exam Name: Certified Data Privacy Solutions Engineer
- Certification Provider: ISACA
- Latest update: Apr 22,2024
Which of the following should be the FIRST consideration when selecting a data sanitization method?
- A . Risk tolerance
- B . Implementation cost
- C . Industry standards
- D . Storage type
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
- A . Conducting a PIA requires significant funding and resources.
- B . PIAs need to be performed many times in a year.
- C . The organization lacks knowledge of PIA methodology.
- D . The value proposition of a PIA is not understood by management.
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
- A . Develop and communicate a data security plan.
- B . Perform a privacy impact assessment (PIA).
- C . Ensure strong encryption is used.
- D . Conduct a security risk assessment.
Which of the following is the MOST important consideration when determining retention periods for personal data?
- A . Sectoral best practices for the industry
- B . Notice provided to customers during data collection
- C . Data classification standards
- D . Storage capacity available for retained data
A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate .
Which of the following should be of GREATEST concern?
- A . The third-party workspace is hosted in a highly regulated jurisdiction.
- B . Personal data could potentially be exfiltrated through the virtual workspace.
- C . The organization’s products are classified as intellectual property.
- D . There is a lack of privacy awareness and training among remote personnel.
A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries .
Which of the following is the MOST important data protection consideration for this project?
- A . Industry best practice related to information security standards in each relevant jurisdiction
- B . Identity and access management mechanisms to restrict access based on need to know
- C . Encryption algorithms for securing customer personal data at rest and in transit
- D . National data privacy legislative and regulatory requirements in each relevant jurisdiction
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users .
Which of the following is the MOST legitimate information to collect for business reasons in this situation?
- A . Height, weight, and activities
- B . Sleep schedule and calorie intake
- C . Education and profession
- D . Race, age, and gender
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
- A . Changes to current information architecture
- B . Updates to data life cycle policy
- C . Business impact due to the changes
- D . Modifications to data quality standards
Which of the following should be considered personal information?
- A . Biometric records
- B . Company address
- C . University affiliation
- D . Age
Which of the following MOST effectively protects against the use of a network sniffer?
- A . Network segmentation
- B . Transport layer encryption
- C . An intrusion detection system (IDS)
- D . A honeypot environment