ISACA CDPSE Exam Practice Questions (P. 3)
- Full Access (374 questions)
- One Year of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
- AEnd users using weak passwords
- BOrganizations using weak encryption to transmit data
- CVulnerabilities existing in authentication pages
- DEnd users forgetting their passwords
Correct Answer:
A
A
send
light_mode
delete
Question #22
Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?
- AImplement a data loss prevention (DLP) system.
- BUse only the data required by the application.
- CEncrypt all data used by the application.
- DCapture the application’s authentication logs.
Correct Answer:
B
B
send
light_mode
delete
Question #23
An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities. Which data protection principle is applied?
- AData integrity and confidentiality
- BSystem use requirements
- CData use limitation
- DLawfulness and fairness
send
light_mode
delete
Question #24
What type of personal information can be collected by a mobile application without consent?
- AFull name
- BGeolocation
- CPhone number
- DAccelerometer dataMost Voted
send
light_mode
delete
Question #25
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
- ADistributing a privacy rights policy
- BMailing rights documentation to customers
- CPublishing a privacy notice
- DGaining consent when information is collected
Correct Answer:
C
C
send
light_mode
delete
Question #26
A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?
- AEnsure the data loss prevention (DLP) tool is logging activity.
- BDe-identify all personal data in the database.
- CDetermine what data is required by the application.
- DRenew the encryption key to include the application.
Correct Answer:
C
C
send
light_mode
delete
Question #27
Which of the following MUST be available to facilitate a robust data breach management response?
- ALessons learned from prior data breach responses
- BBest practices to obfuscate data for processing and storage
- CAn inventory of previously impacted individuals
- DAn inventory of affected individuals and systems
send
light_mode
delete
Question #28
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
send
light_mode
delete
Question #29
Which of the following poses the GREATEST privacy risk for client-side application processing?
- AFailure of a firewall protecting the company network
- BAn employee loading personal information on a company laptop
- CA remote employee placing communication software on a company server
- DA distributed denial of service attack (DDoS) on the company network
Correct Answer:
B
B
send
light_mode
delete
Question #30
Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?
- AAccess is logged on the virtual private network (VPN).
- BMulti-factor authentication is enabled.
- CActive remote access is monitored.
- DAccess is only granted to authorized users.
Correct Answer:
D
D
send
light_mode
delete
All Pages
