Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following technologies BEST facilitates protection of personal data?

Options:

A.

Data loss prevention (DLP) tools


B.

Data discovery and mapping tools


C.

Data log file monitoring tools


D.

Data profiling tools


Expert Solution
Questions # 32:

A privacy risk assessment identified that a third-party collects personal data on the organization's behalf. This finding could subject the organization to a regulatory fine for not disclosing this relationship. What should the organization do NEXT?

Options:

A.

Amend the privacy policy to include a provision that data might be collected by trusted third parties.


B.

Review the third-party relationship to determine who should be collecting data.


C.

Update the risk assessment process to cover only required disclosures.


D.

Disclose the relationship to those affected in jurisdictions where such disclosures are required.


Expert Solution
Questions # 33:

Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?

Options:

A.

User acceptance testing (UAT)


B.

Data classification


C.

Privacy impact assessment (PIA)


D.

Automatic dynamic code scan


Expert Solution
Questions # 34:

Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?

Options:

A.

Focus on developing a risk action plan based on audit reports.


B.

Focus on requirements with the highest organizational impact.


C.

Focus on global compliance before meeting local requirements.


D.

Focus on local standards before meeting global compliance.


Expert Solution
Questions # 35:

Which cloud deployment model is BEST for an organization whose main objectives are to logically isolate personal data from other tenants and adopt custom privacy controls for the data?

Options:

A.

Community cloud


B.

Private cloud


C.

Hybrid cloud


D.

Public cloud


Expert Solution
Questions # 36:

Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?

Options:

A.

APIs are costly to assess and monitor.


B.

API keys could be stored insecurely.


C.

APIs are complex to build and test


D.

APIS could create an unstable environment


Expert Solution
Questions # 37:

An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is

BEST used to identity and review the application's runtime modules?

Options:

A.

Static application security testing (SAST)


B.

Dynamic application security testing (DAST)


C.

Regression testing


D.

Software composition analysis


Expert Solution
Questions # 38:

When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?

Options:

A.

Encoding


B.

Backup


C.

Encryption


D.

Classification


Expert Solution
Questions # 39:

Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?

Options:

A.

Implementing automated data discovery and classification tools


B.

Implementing an internal solution to allow for inventory updates


C.

Developing and conducting periodic manual audits of all data assets


D.

Relying on each department to update data records quarterly


Expert Solution
Questions # 40:

Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?

Options:

A.

Input reference controls


B.

Access controls


C.

Input validation controls


D.

Reconciliation controls


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions