Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?

Options:

A.

Encrypting APIs with the organization’s private key


B.

Requiring nondisclosure agreements (NDAs) when sharing APIs


C.

Restricting access to authorized users


D.

Sharing only digitally signed APIs


Questions # 2:

Which of the following system architectures BEST supports anonymity for data transmission?

Options:

A.

Client-server


B.

Plug-in-based


C.

Front-end


D.

Peer-to-peer


Questions # 3:

Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?

Options:

A.

To identify controls to mitigate data privacy risks


B.

To classify personal data according to the data classification scheme


C.

To assess the risk associated with personal data usage


D.

To determine the service provider’s ability to maintain data protection controls


Questions # 4:

Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?

Options:

A.

Define the mobile app privacy policy.


B.

Implement application hardening measures.


C.

Provide the app only through official app stores


D.

Conduct penetration testing


Questions # 5:

Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?

Options:

A.

Read-only access


B.

Least privilege


C.

Segregation of duties


D.

Data minimization


Questions # 6:

Transport Layer Security (TLS) provides data integrity through:

Options:

A.

calculation of message digests.


B.

use of File Transfer Protocol (FTP).


C.

asymmetric encryption of data sets.


D.

exchange of digital certificates.


Questions # 7:

Which of the following should be done NEXT after a privacy risk has been accepted?

Options:

A.

Monitor the risk landscape for material changes.


B.

Determine the risk appetite With management.


C.

Adjust the risk rating to help ensure it is remediated


D.

Reconfirm the risk during the next reporting period


Questions # 8:

It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?

Options:

A.

Application design


B.

Requirements definition


C.

Implementation


D.

Testing


Questions # 9:

A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?

Options:

A.

Industry best practice related to information security standards in each relevant jurisdiction


B.

Identity and access management mechanisms to restrict access based on need to know


C.

Encryption algorithms for securing customer personal data at rest and in transit


D.

National data privacy legislative and regulatory requirements in each relevant jurisdiction


Questions # 10:

Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?

Options:

A.

For the purpose of medical research


B.

A forthcoming campaign to win back customers


C.

A required retention period due to regulations


D.

Ease of onboarding when the customer returns


Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions