Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

Options:

A.

Server details of the hosting environment


B.

Last user who accessed personal data


C.

Application error events


D.

Last logins of privileged users


Expert Solution
Questions # 12:

An organization is planning a new implementation for tracking consumer web browser activity. Which of the following should be done FIRST?

Options:

A.

Seek approval from regulatory authorities.


B.

Conduct a privacy impact assessment (PIA).


C.

Obtain consent from the organization’s clients.


D.

Review and update the cookie policy.


Expert Solution
Questions # 13:

Which of the following is the BEST way to ensure an organization's enterprise risk management (ERM) framework can protect the organization from privacy harms?

Options:

A.

Include privacy risks as a risk category.


B.

Establish a privacy incident response plan.


C.

Conduct an internal privacy audit.


D.

Complete a privacy risk assessment.


Expert Solution
Questions # 14:

An email opt-in form on a website applies to which privacy principle?

Options:

A.

Accuracy


B.

Consent


C.

Transparency


D.

Integrity


Expert Solution
Questions # 15:

Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?

Options:

A.

Read-only access


B.

Least privilege


C.

Segregation of duties


D.

Data minimization


Expert Solution
Questions # 16:

Which encryption method encrypts and decrypts data using two separate yet mathematically connected cryptographic keys?

Options:

A.

Hashing


B.

Private key


C.

Asymmetric


D.

Symmetric


Expert Solution
Questions # 17:

Which of the following is the BEST indication of a highly effective privacy training program?

Options:

A.

Members of the workforce understand their roles in protecting data privacy


B.

Recent audits have no findings or recommendations related to data privacy


C.

No privacy incidents have been reported in the last year


D.

HR has made privacy training an annual mandate for the organization_


Expert Solution
Questions # 18:

Which of the following should an organization do FIRST to ensure it can respond to all data subject access requests in a timely manner?

Options:

A.

Understand the data in its possession.


B.

Invest in a platform to automate data review


C.

Confirm what is required for disclosure.


D.

Create a policy for handling access request


Expert Solution
Questions # 19:

Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?

Options:

A.

User acceptance testing (UAT)


B.

Patch management


C.

Software hardening


D.

Web application firewall (WAF)


Expert Solution
Questions # 20:

An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?

Options:

A.

Low-level formatting


B.

Remote partitioning


C.

Degaussing


D.

Hammer strike


Expert Solution
Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions