Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following BEST ensures data confidentiality across databases?

Options:

A.

Logical data model


B.

Data normalization


C.

Data catalog vocabulary


D.

Data anonymization


Expert Solution
Questions # 42:

Which of the following outputs of a privacy audit is MOST likely to trigger remedial action?

Options:

A.

Deficiencies in how personal data is shared with third parties


B.

Recommendations to optimize current privacy policy


C.

Identification of uses of sensitive personal data


D.

Areas of focus for privacy training


Expert Solution
Questions # 43:

Transport Layer Security (TLS) provides data integrity through:

Options:

A.

calculation of message digests.


B.

use of File Transfer Protocol (FTP).


C.

asymmetric encryption of data sets.


D.

exchange of digital certificates.


Expert Solution
Questions # 44:

An organization is considering whether to expand its operations into additional international jurisdictions. After performing a privacy risk assessment, the organization decides not to begin operating in those jurisdictions. Which of the following BEST describes this type of risk response?

Options:

A.

Risk avoidance


B.

Risk reduction


C.

Risk acceptance


D.

Risk mitigation


Expert Solution
Questions # 45:

An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption

keys?

Options:

A.

Ensure key management responsibility is assigned to the privacy officer.


B.

Ensure the keys are stored in a remote server.


C.

Ensure the keys are stored in a cryptographic vault.


D.

Ensure all access to the keys is under dual control_


Expert Solution
Questions # 46:

Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

Options:

A.

The user’s ability to select, filter, and transform data before it is shared


B.

Umbrella consent for multiple applications by the same developer


C.

User consent to share personal data


D.

Unlimited retention of personal data by third parties


Expert Solution
Questions # 47:

Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?

Options:

A.

Develop and communicate a data security plan.


B.

Perform a privacy impact assessment (PIA).


C.

Ensure strong encryption is used.


D.

Conduct a security risk assessment.


Expert Solution
Questions # 48:

Which of the following is the MOST important consideration when writing an organization’s privacy policy?

Options:

A.

Using a standardized business taxonomy


B.

Aligning statements to organizational practices


C.

Ensuring acknowledgment by the organization’s employees


D.

Including a development plan for personal data handling


Expert Solution
Questions # 49:

Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?

Options:

A.

Observed data


B.

Inferred data


C.

Derived data


D.

Provided data


Expert Solution
Questions # 50:

Which of the following BEST ensures an effective data privacy policy is implemented?

Options:

A.

Developing a clear privacy statement with documented objectives


B.

Incorporating data privacy regulations from all jurisdictions


C.

Aligning regulatory requirements with business needs


D.

Providing a comprehensive review of the policy for all business units


Expert Solution
Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions