Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions
Questions # 51:

A data processor that handles personal data tor multiple customers has decided to migrate its data warehouse to a third-party provider. What is the processor

obligated to do prior to implementation?

Options:

A.

Seek approval from all in-scope data controllers.


B.

Obtain assurance that data subject requests will continue to be handled appropriately


C.

Implement comparable industry-standard data encryption in the new data warehouse


D.

Ensure data retention periods are documented


Expert Solution
Questions # 52:

Which of the following MOST effectively protects against the use of a network sniffer?

Options:

A.

Network segmentation


B.

Transport layer encryption


C.

An intrusion detection system (IDS)


D.

A honeypot environment


Expert Solution
Questions # 53:

Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?

Options:

A.

Conduct an audit.


B.

Report performance metrics.


C.

Perform a control self-assessment (CSA).


D.

Conduct a benchmarking analysis.


Expert Solution
Questions # 54:

Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?

Options:

A.

Detailed documentation of data privacy processes


B.

Strategic goals of the organization


C.

Contract requirements for independent oversight


D.

Business objectives of senior leaders


Expert Solution
Questions # 55:

Which of the following is the MOST important reason for an organization to establish a framework for privacy audits?

Options:

A.

To confirm the effectiveness of the privacy program


B.

To provide insight to historical privacy breaches and incidents


C.

To maximize audit staff attention on the highest risks


D.

To benchmark against historical information and trends


Expert Solution
Questions # 56:

An organization has initiated a project to enhance privacy protections by improving its information security controls. Which of the following is the MOST useful action to help define the scope of the project?

Options:

A.

Review recent audit reports on the internal control environment


B.

Identify databases that contain personal data


C.

Identify databases that do not have encryption in place.


D.

Review proposed privacy rules that govern the processing of personal data


Expert Solution
Questions # 57:

Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?

Options:

A.

Set a unique static IP for the default network interface.


B.

Disable all wireless networking in the group policy.


C.

Reinstall the operating system and enable laptop encryption.


D.

Perform a full wipe and reimage of the laptops.


Expert Solution
Questions # 58:

As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

Options:

A.

Identify sensitive unstructured data at the point of creation.


B.

Classify sensitive unstructured data.


C.

Identify who has access to sensitive unstructured data.


D.

Assign an owner to sensitive unstructured data.


Expert Solution
Questions # 59:

Which of the following is MOST suitable for facilitating and reporting to senior management on the enterprise privacy posture over time?

Options:

A.

Enterprise metadata inventory


B.

Privacy impact assessment (PIA)


C.

Vulnerability assessment results


D.

Continuous monitoring dashboards


Expert Solution
Questions # 60:

Which of the following BEST represents privacy threat modeling methodology?

Options:

A.

Mitigating inherent risks and threats associated with privacy control weaknesses


B.

Systematically eliciting and mitigating privacy threats in a software architecture


C.

Reliably estimating a threat actor’s ability to exploit privacy vulnerabilities


D.

Replicating privacy scenarios that reflect representative software usage


Expert Solution
Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions