Pass the Isaca Isaca Certification CDPSE Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following should be considered personal information?

Options:

A.

Biometric records


B.

Company address


C.

University affiliation


D.

Age


Expert Solution
Questions # 62:

Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?

Options:

A.

The data is encrypted and a key is required to re-identify the data.


B.

Key fields are hidden and unmasking is required to access to the data.


C.

Names and addresses are removed but the rest of the data is left untouched.


D.

The data is transformed such that re-identification is impossible.


Expert Solution
Questions # 63:

Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?

Options:

A.

Degaussing the drive


B.

Factory resetting the drive


C.

Crypto-shredding the drive


D.

Reformatting the drive


Expert Solution
Questions # 64:

When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?

Options:

A.

Encryption of customer data


B.

Removal of customer data


C.

De-identification of customer data


D.

Destruction of customer data


Expert Solution
Questions # 65:

Which of the following is the BEST approach for an organization that wants to transfer risk associated with a potential breach involving customer personal data?

Options:

A.

Adopt industry standards for breach response


B.

Purchase cyber insurance


C.

Hire an external data processor


D.

Retain a third party for breach investigation


Expert Solution
Questions # 66:

When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

Options:

A.

The data must be protected by multi-factor authentication.


B.

The identifier must be kept separate and distinct from the data it protects.


C.

The key must be a combination of alpha and numeric characters.


D.

The data must be stored in locations protected by data loss prevention (DLP) technology.


Expert Solution
Questions # 67:

Which of the following is a PRIMARY element of application and software hardening?

Options:

A.

Vulnerability analysis


B.

Database configuration


C.

Code review


D.

Software repository


Expert Solution
Questions # 68:

When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

Options:

A.

The key must be kept separate and distinct from the data it protects.


B.

The data must be protected by multi-factor authentication.


C.

The key must be a combination of alpha and numeric characters.


D.

The data must be stored in locations protected by data loss prevention (DLP) technology.


Expert Solution
Questions # 69:

Which of the following is the MOST important privacy consideration for video surveillance in high security areas?

Options:

A.

Video surveillance recordings may only be viewed by the organization.


B.

Those affected must be informed of the video surveillance_


C.

There is no limitation for retention of this data.


D.

Video surveillance data must be stored in encrypted format.


Expert Solution
Questions # 70:

Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?

Options:

A.

The right to object


B.

The right to withdraw consent


C.

The right to access


D.

The right to be forgotten


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions