ISACA CDPSE Exam Practice Questions (P. 5)
- Full Access (337 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
- AThe key must be kept separate and distinct from the data it protects.
- BThe data must be protected by multi-factor authentication.
- CThe key must be a combination of alpha and numeric characters.
- DThe data must be stored in locations protected by data loss prevention (DLP) technology.
Correct Answer:
D
D
send
light_mode
delete
Question #42
Which party should data subject contact FIRST if they believe their personal information has been collected and used without consent?
- APrivacy rights advocate
- BOutside privacy counsel
- CData protection authorities
- DThe organization’s chief privacy officer (CPO)
Correct Answer:
C
C
send
light_mode
delete
Question #43
Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?
- AUnderstanding the data flows within the organization
- BImplementing strong access controls on a need-to-know basis
- CAnonymizing privacy data during collection and recording
- DEncrypting the data throughout its life cycle
Correct Answer:
A
A
send
light_mode
delete
Question #44
Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
- AOnline behavioral trackingMost Voted
- BRadio frequency identification (RFID)
- CWebsite cookies
- DBeacon-based tracking
send
light_mode
delete
Question #45
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
- ADevelop and communicate a data security plan.
- BPerform a privacy impact assessment (PIA).
- CEnsure strong encryption is used.
- DConduct a security risk assessment.
Correct Answer:
B
B
send
light_mode
delete
Question #46
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
- ADe-identifying the data to be analyzed
- BVerifying the data subjects have consented to the processing
- CDefining the intended objectives
- DEnsuring proper data sets are used to train the models
Correct Answer:
B
B
send
light_mode
delete
Question #47
To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:
- Atraining and testing requirements for employees handling personal data.
- Broles and responsibilities of the person with oversight.
- Cmetrics and outcomes recommended by external agencies.
- Dthe scope and responsibilities of the data owner.
Correct Answer:
B
B
send
light_mode
delete
Question #48
Which of the following BEST ensures data confidentiality across databases?
- ALogical data model
- BData normalization
- CData catalog vocabulary
- DData anonymization
Correct Answer:
D
D
send
light_mode
delete
Question #49
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
- APrivate key exposure
- BPoor patch management
- CLack of password complexity
- DOut-of-date antivirus signatures
Correct Answer:
A
A
send
light_mode
delete
Question #50
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
- AChanges to current information architecture
- BUpdates to data life cycle policy
- CBusiness impact due to the changes
- DModifications to data quality standards
Correct Answer:
B
B
send
light_mode
delete
All Pages
