ISACA CDPSE Certified Data Privacy Solutions Engineer Online Training
ISACA CDPSE Online Training
The questions for CDPSE were last updated at May 11,2025.
- Exam Code: CDPSE
- Exam Name: Certified Data Privacy Solutions Engineer
- Certification Provider: ISACA
- Latest update: May 11,2025
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
- A . User acceptance testing (UAT)
- B . Patch management
- C . Software hardening
- D . Web application firewall (WAF)
Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?
- A . It eliminates cryptographic key collision.
- B . It minimizes the risk if the cryptographic key is compromised.
- C . It is more practical and efficient to use a single cryptographic key.
- D . Each process can only be supported by its own unique key management process.
During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?
- A . Functional testing
- B . Development
- C . Production
- D . User acceptance testing (UAT)
Which of the following is the PRIMARY reason that organizations need to map the data flows of personal data?
- A . To assess privacy risks
- B . To evaluate effectiveness of data controls
- C . To determine data integration gaps
- D . To comply with regulations
Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?
- A . Whole disk encryption
- B . Asymmetric encryption
- C . Digital signature
- D . Symmetric encryption
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
- A . The data must be protected by multi-factor authentication.
- B . The identifier must be kept separate and distinct from the data it protects.
- C . The key must be a combination of alpha and numeric characters.
- D . The data must be stored in locations protected by data loss prevention (DLP) technology.
Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?
- A . Encrypt the data at rest.
- B . De-identify the data.
- C . Use a unique hashing algorithm.
- D . Require a digital signature.
Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?
- A . Possession factor authentication
- B . Knowledge-based credential authentication
- C . Multi-factor authentication
- D . Biometric authentication
Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?
- A . User acceptance testing (UAT)
- B . Data classification
- C . Privacy impact assessment (PIA)
- D . Automatic dynamic code scan
Which of the following is the PRIMARY benefit of implementing policies and procedures for system hardening?
- A . It increases system resiliency.
- B . It reduces external threats to data.
- C . It reduces exposure of data.
- D . It eliminates attack motivation for data.