Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following is the MOST important consideration when choosing a method for data destruction?

Options:

A.

Granularity of data to be destroyed


B.

Validation and certification of data destruction


C.

Time required for the chosen method of data destruction


D.

Level and strength of current data encryption


Questions # 22:

A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?

Options:

A.

Access to personal data is not strictly controlled in development and testing environments.


B.

Complex relationships within and across systems must be retained for testing.


C.

Personal data across the various interconnected systems cannot be easily identified.


D.

Data masking tools are complex and difficult to implement.


Questions # 23:

Critical data elements should be mapped to which of the following?

Options:

A.

Data process flow


B.

Business analytics


C.

Business taxonomy


D.

Privacy policy


Questions # 24:

A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the

lender. Which fundamental data subject right does this process infringe upon?

Options:

A.

Right to restriction of processing


B.

Right to be informed


C.

Right not to be profiled


D.

Right to object


Questions # 25:

Which of the following BEST represents privacy threat modeling methodology?

Options:

A.

Mitigating inherent risks and threats associated with privacy control weaknesses


B.

Systematically eliciting and mitigating privacy threats in a software architecture


C.

Reliably estimating a threat actor’s ability to exploit privacy vulnerabilities


D.

Replicating privacy scenarios that reflect representative software usage


Questions # 26:

Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?

Options:

A.

Set a unique static IP for the default network interface.


B.

Disable all wireless networking in the group policy.


C.

Reinstall the operating system and enable laptop encryption.


D.

Perform a full wipe and reimage of the laptops.


Questions # 27:

The MOST effective way to incorporate privacy by design principles into applications is to include privacy requirements in.

Options:

A.

senior management approvals.


B.

secure coding practices


C.

software development practices.


D.

software testing guidelines.


Questions # 28:

Which of the following is the BEST way to protect personal data in the custody of a third party?

Options:

A.

Have corporate counsel monitor privacy compliance.


B.

Require the third party to provide periodic documentation of its privacy management program.


C.

Include requirements to comply with the organization’s privacy policies in the contract.


D.

Add privacy-related controls to the vendor audit plan.


Questions # 29:

Which of the following is the MOST important attribute of a privacy policy?

    Breach notification period

Options:

A.

Data retention period


B.

Transparency


C.

Language localization


Questions # 30:

When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?

Options:

A.

Data classification labeling


B.

Data residing in another country


C.

Volume of data stored


D.

Privacy training for backup users


Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions