ISACA CDPSE Exam Practice Questions (P. 2)
- Full Access (337 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
- AInformation security assessments
- BPrivacy impact assessments (PIAs)
- CData privacy standards
- DData lake configuration
Correct Answer:
B
B
send
light_mode
delete
Question #12
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
- AData classification labeling
- BData residing in another countryMost Voted
- CVolume of data stored
- DPrivacy training for backup users
Correct Answer:
A
A
send
light_mode
delete
Question #13
Which of the following should be the FIRST consideration when selecting a data sanitization method?
- ARisk tolerance
- BImplementation cost
- CIndustry standards
- DStorage type
Correct Answer:
D
D
send
light_mode
delete
Question #14
Which of the following system architectures BEST supports anonymity for data transmission?
send
light_mode
delete
Question #15
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
- AChief data officer (CDO)
- BPrivacy steering committee
- CInformation security steering committee
- DChief privacy officer (CPO)Most Voted
send
light_mode
delete
Question #16
Which of the following is the BEST way to protect personal data in the custody of a third party?
- AHave corporate counsel monitor privacy compliance.
- BRequire the third party to provide periodic documentation of its privacy management program.
- CInclude requirements to comply with the organization’s privacy policies in the contract.
- DAdd privacy-related controls to the vendor audit plan.
Correct Answer:
C
C
send
light_mode
delete
Question #17
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
- AThe system architecture is clearly defined.
- BA risk assessment has been completed.
- CSecurity controls are clearly defined.
- DData protection requirements are included.
Correct Answer:
D
D
send
light_mode
delete
Question #18
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
- AConduct an audit.
- BReport performance metrics.
- CPerform a control self-assessment (CSA).
- DConduct a benchmarking analysis.
Correct Answer:
D
D
send
light_mode
delete
Question #19
Which of the following is the GREATEST benefit of adopting data minimization practices?
- AStorage and encryption costs are reduced.
- BData retention efficiency is enhanced.
- CThe associated threat surface is reduced.
- DCompliance requirements are met.
Correct Answer:
B
B
send
light_mode
delete
Question #20
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?
send
light_mode
delete
All Pages
