Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?

Options:

A.

Height, weight, and activities


B.

Sleep schedule and calorie intake


C.

Education and profession


D.

Race, age, and gender


Questions # 52:

Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?

Options:

A.

User acceptance testing (UAT)


B.

Patch management


C.

Software hardening


D.

Web application firewall (WAF)


Questions # 53:

An email opt-in form on a website applies to which privacy principle?

Options:

A.

Accuracy


B.

Consent


C.

Transparency


D.

Integrity


Questions # 54:

Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?

Options:

A.

Approving privacy impact assessments (PIAs)


B.

Validating the privacy framework


C.

Managing privacy notices provided to customers


D.

Establishing employee privacy rights and consent


Questions # 55:

When can data subjects be prohibited from withdrawing consent for processing their personal data?

Options:

A.

When the data is no longer necessary


B.

When the processing is unlawful


C.

When there is an absence of overriding legitimate grounds


D.

When the data is being archived in the public interest


Questions # 56:

To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.

Options:

A.

general counsel.


B.

database administrator.


C.

business application owner


D.

chief information officer (CIO)


Questions # 57:

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

Options:

A.

Server details of the hosting environment


B.

Last logins of privileged users


C.

Last user who accessed personal data


D.

Application error events


Questions # 58:

Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?

Options:

A.

Privacy policy


B.

Network security standard


C.

Multi-factor authentication


D.

Virtual private network (VPN)


Questions # 59:

A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?

Options:

A.

Discretionary access control (DAC)


B.

Attribute-based access control (ABAC)


C.

Provision-based access control (PBAC)


D.

Mandatory access control (MAC)


Questions # 60:

Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?

Options:

A.

To reduce the risk of sensitive data breaches


B.

To meet the organization's security baseline


C.

To ensure technical security measures are effective


D.

To prevent possible identity theft


Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions