Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?

Options:

A.

It uses Transport Layer Security (TLS).


B.

It provides a secure connection on an insecure network


C.

It makes public key cryptography feasible.


D.

It contains schemes for revoking keys.


Questions # 12:

Before executive leadership approves a new data privacy policy, it is MOST important to ensure:

Options:

A.

a training program is developed.


B.

a privacy committee is established.


C.

a distribution methodology is identified.


D.

a legal review is conducted.


Questions # 13:

Which of the following is MOST important when developing an organizational data privacy program?

Options:

A.

Obtaining approval from process owners


B.

Profiling current data use


C.

Following an established privacy framework


D.

Performing an inventory of all data


Questions # 14:

Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?

Options:

A.

Skills training programs


B.

Awareness campaigns


C.

Performance evaluations


D.

Code of conduct principles


Questions # 15:

Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?

Options:

A.

Disable location services.


B.

Disable Bluetooth services.


C.

Enable Trojan scanners.


D.

Enable antivirus for mobile devices.


Questions # 16:

Which of the following is the BEST way to ensure an organization's enterprise risk management (ERM) framework can protect the organization from privacy harms?

Options:

A.

Include privacy risks as a risk category.


B.

Establish a privacy incident response plan.


C.

Conduct an internal privacy audit.


D.

Complete a privacy risk assessment.


Questions # 17:

Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?

Options:

A.

Private key exposure


B.

Poor patch management


C.

Lack of password complexity


D.

Out-of-date antivirus signatures


Questions # 18:

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

Options:

A.

Gaining consent when information is collected


B.

Publishing a privacy notice


C.

Mailing rights documentation to customers


D.

Distributing a privacy rights policy


Questions # 19:

Which of the following BEST ensures an organization's data retention requirements will be met in the public cloud environment?

Options:

A.

Data classification schemes


B.

Automated data deletion schedules


C.

Cloud vendor agreements


D.

Service level agreements (SLAs)


Questions # 20:

Which of the following is a role PRIMARILY assigned to an internal data owner?

Options:

A.

Monitoring data retention periods


B.

Authorizing access rights


C.

Serving as primary contact with regulators


D.

Implementing appropriate technical controls


Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions