Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

Options:

A.

Identify sensitive unstructured data at the point of creation.


B.

Classify sensitive unstructured data.


C.

Identify who has access to sensitive unstructured data.


D.

Assign an owner to sensitive unstructured data.


Questions # 42:

Which of the following MOST effectively protects against the use of a network sniffer?

Options:

A.

Network segmentation


B.

Transport layer encryption


C.

An intrusion detection system (IDS)


D.

A honeypot environment


Questions # 43:

Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?

Options:

A.

Require data dictionaries from service providers that handle the organization's personal data.


B.

Outsource personal data processing to the same third party


C.

Require independent audits of the providers' data privacy controls


D.

Require service level agreements (SLAs) to ensure data integrity while safeguarding confidentiality


Questions # 44:

Which of the following BEST ensures an effective data privacy policy is implemented?

Options:

A.

Developing a clear privacy statement with documented objectives


B.

Incorporating data privacy regulations from all jurisdictions


C.

Aligning regulatory requirements with business needs


D.

Providing a comprehensive review of the policy for all business units


Questions # 45:

Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?

Options:

A.

Require an annual internal audit of SDLC processes.


B.

Include qualified application security personnel as part of the process.


C.

Ensure comprehensive application security testing immediately prior to release.


D.

Require an annual third-party audit of new client software solutions.


Questions # 46:

Which of the following is the PRIMARY objective of privacy incident response?

Options:

A.

To ensure data subjects impacted by privacy incidents are notified.


B.

To reduce privacy risk to the lowest possible level


C.

To mitigate the impact of privacy incidents


D.

To optimize the costs associated with privacy incidents


Questions # 47:

Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?

Options:

A.

Detailed documentation of data privacy processes


B.

Strategic goals of the organization


C.

Contract requirements for independent oversight


D.

Business objectives of senior leaders


Questions # 48:

Which of the following is the BEST way to address privacy concerns when an organization captures personal data from a third party through an open application

programming interface (API)?

Options:

A.

Develop a service level agreement (SLA) with the third party


B.

Implement encryption for the data transmission


C.

Obtain consent from the data subjects


D.

Review the specification document of the open API.


Questions # 49:

Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?

Options:

A.

It eliminates cryptographic key collision.


B.

It minimizes the risk if the cryptographic key is compromised.


C.

It is more practical and efficient to use a single cryptographic key.


D.

Each process can only be supported by its own unique key management process.


Questions # 50:

Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?

Options:

A.

Observed data


B.

Inferred data


C.

Derived data


D.

Provided data


Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions