ISACA CDPSE Exam Practice Questions (P. 1)
- Full Access (337 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
What should be the PRIMARY consideration of a multinational organization deploying a user and entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?
- ACross-border data transferMost Voted
- BSupport staff availability and skill set
- CUser notification
- DGlobal public interest
send
light_mode
delete
Question #2
Which of the following should be the FIRST consideration when conducting a privacy impact assessment (PIA)?
- AThe applicable privacy legislationMost Voted
- BThe quantity of information within the scope of the assessment
- CThe systems in which privacy-related data is stored
- DThe organizational security risk profile
Correct Answer:
C
C
send
light_mode
delete
Question #3
Which of the following BEST represents privacy threat modeling methodology?
- AMitigating inherent risks and threats associated with privacy control weaknesses
- BSystematically eliciting and mitigating privacy threats in a software architecture
- CReliably estimating a threat actor’s ability to exploit privacy vulnerabilities
- DReplicating privacy scenarios that reflect representative software usage
Correct Answer:
A
A
send
light_mode
delete
Question #4
An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?
send
light_mode
delete
Question #5
Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?
- AReview the privacy policy.
- BObtain independent assurance of current practices.
- CRe-assess the information security requirements.
- DValidate contract compliance.
Correct Answer:
D
D
send
light_mode
delete
Question #6
During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?
- ASegregation of duties
- BUnique user credentials
- CTwo-person rule
- DNeed-to-know basis
Correct Answer:
A
A
send
light_mode
delete
Question #7
Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?
- ADetailed documentation of data privacy processes
- BStrategic goals of the organization
- CContract requirements for independent oversight
- DBusiness objectives of senior leaders
Correct Answer:
B
B
send
light_mode
delete
Question #8
Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?
- AProviding system engineers the ability to search and retrieve data
- BAllowing individuals to have direct access to their data
- CAllowing system administrators to manage data access
- DEstablishing a data privacy customer service bot for individuals
Correct Answer:
B
B
send
light_mode
delete
Question #9
Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?
- AThe service provider has denied the organization’s request for right to audit.
- BPersonal data stored on the cloud has not been anonymized.
- CThe extent of the service provider’s access to data has not been established.
- DThe data is stored in a region with different data protection requirements.
Correct Answer:
D
D
send
light_mode
delete
Question #10
When configuring information systems for the communication and transport of personal data, an organization should:
- Aadopt the default vendor specifications.
- Breview configuration settings for compliance.
- Cimplement the least restrictive mode.
- Denable essential capabilities only.
Correct Answer:
B
B
send
light_mode
delete
All Pages
