ISACA CDPSE Certified Data Privacy Solutions Engineer Online Training
ISACA CDPSE Online Training
The questions for CDPSE were last updated at May 11,2025.
- Exam Code: CDPSE
- Exam Name: Certified Data Privacy Solutions Engineer
- Certification Provider: ISACA
- Latest update: May 11,2025
When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
- A . The key must be kept separate and distinct from the data it protects.
- B . The data must be protected by multi-factor authentication.
- C . The key must be a combination of alpha and numeric characters.
- D . The data must be stored in locations protected by data loss prevention (DLP) technology.
Which party should data subject contact FIRST if they believe their personal information has been collected and used without consent?
- A . Privacy rights advocate
- B . Outside privacy counsel
- C . Data protection authorities
- D . The organization’s chief privacy officer (CPO)
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
- A . Understanding the data flows within the organization
- B . Implementing strong access controls on a need-to-know basis
- C . Anonymizing privacy data during collection and recording
- D . Encrypting the data throughout its life cycle
Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
- A . Online behavioral tracking
- B . Radio frequency identification (RFID)
- C . Website cookies
- D . Beacon-based tracking
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
- A . Develop and communicate a data security plan.
- B . Perform a privacy impact assessment (PIA).
- C . Ensure strong encryption is used.
- D . Conduct a security risk assessment.
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
- A . De-identifying the data to be analyzed
- B . Verifying the data subjects have consented to the processing
- C . Defining the intended objectives
- D . Ensuring proper data sets are used to train the models
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
- A . training and testing requirements for employees handling personal data.
- B . roles and responsibilities of the person with oversights.
- C . metrics and outcomes recommended by external agencies.
- D . the scope and responsibilities of the data owner.
Which of the following BEST ensures data confidentiality across databases?
- A . Logical data model
- B . Data normalization
- C . Data catalog vocabulary
- D . Data anonymization
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
- A . Private key exposure
- B . Poor patch management
- C . Lack of password complexity
- D . Out-of-date antivirus signatures
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
- A . Changes to current information architecture
- B . Updates to data life cycle policy
- C . Business impact due to the changes
- D . Modifications to data quality standards