Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CDPSE Certified Data Privacy Solutions Engineer Questions and Answers

Questions 4

An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?

Options:

A.

Data archiving

B.

Data storage

C.

Data acquisition

D.

Data input

Buy Now
Questions 5

An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?

Options:

A.

Data tagging

B.

Data normalization

C.

Data mapping

D.

Data hashing

Buy Now
Questions 6

When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?

Options:

A.

Encryption of customer data

B.

Removal of customer data

C.

De-identification of customer data

D.

Destruction of customer data

Buy Now
Questions 7

Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?

Options:

A.

Private key exposure

B.

Poor patch management

C.

Lack of password complexity

D.

Out-of-date antivirus signatures

Buy Now
Questions 8

Which of the following helps define data retention time in a stream-fed data lake that includes personal data?

Options:

A.

Privacy impact assessments (PIAs)

B.

Data lake configuration

C.

Data privacy standards

D.

Information security assessments

Buy Now
Questions 9

Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?

Options:

A.

End users using weak passwords

B.

Organizations using weak encryption to transmit data

C.

Vulnerabilities existing in authentication pages

D.

End users forgetting their passwords

Buy Now
Questions 10

Which of the following helps define data retention time is a stream-fed data lake that includes personal data?

Options:

A.

Information security assessments

B.

Privacy impact assessments (PIAs)

C.

Data privacy standards

D.

Data lake configuration

Buy Now
Questions 11

Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?

Options:

A.

Thick client desktop with virtual private network (VPN) connection

B.

Remote wide area network (WAN) links

C.

Thin Client remote desktop protocol (RDP)

D.

Site-to-site virtual private network (VPN)

Buy Now
Questions 12

A new marketing application needs to use data from the organization’s customer database. Prior to the application using the data, which of the following should be done FIRST?

Options:

A.

Ensure the data loss prevention (DLP) tool is logging activity.

B.

De-identify all personal data in the database.

C.

Determine what data is required by the application.

D.

Renew the encryption key to include the application.

Buy Now
Questions 13

A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the

lender. Which fundamental data subject right does this process infringe upon?

Options:

A.

Right to restriction of processing

B.

Right to be informed

C.

Right not to be profiled

D.

Right to object

Buy Now
Questions 14

Which of the following is the MOST important consideration when writing an organization’s privacy policy?

Options:

A.

Using a standardized business taxonomy

B.

Aligning statements to organizational practices

C.

Ensuring acknowledgment by the organization’s employees

D.

Including a development plan for personal data handling

Buy Now
Questions 15

From a privacy perspective, it is MOST important to ensure data backups are:

Options:

A.

encrypted.

B.

incremental.

C.

differential.

D.

pseudonymized

Buy Now
Questions 16

Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?

Options:

A.

The organization lacks a hardware disposal policy.

B.

Emails are not consistently encrypted when sent internally.

C.

Privacy training is carried out by a service provider.

D.

The organization’s privacy policy has not been reviewed in over a year.

Buy Now
Questions 17

Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?

Options:

A.

Whole disk encryption

B.

Asymmetric encryption

C.

Digital signature

D.

Symmetric encryption

Buy Now
Questions 18

Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?

Options:

A.

It uses Transport Layer Security (TLS).

B.

It provides a secure connection on an insecure network

C.

It makes public key cryptography feasible.

D.

It contains schemes for revoking keys.

Buy Now
Questions 19

Which of the following is the MOST important attribute of a privacy policy?

  • Breach notification period

Options:

A.

Data retention period

B.

Transparency

C.

Language localization

Buy Now
Questions 20

Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?

Options:

A.

Evaluate the impact resulting from this change.

B.

Revisit the current remote working policies.

C.

Implement a virtual private network (VPN) tool.

D.

Enforce multi-factor authentication for remote access.

Buy Now
Questions 21

Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?

Options:

A.

Tokenization

B.

Aggregation

C.

Anonymization

D.

Encryption

Buy Now
Questions 22

Which of the following should be done NEXT after a privacy risk has been accepted?

Options:

A.

Monitor the risk landscape for material changes.

B.

Determine the risk appetite With management.

C.

Adjust the risk rating to help ensure it is remediated

D.

Reconfirm the risk during the next reporting period

Buy Now
Questions 23

Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?

Options:

A.

Define the mobile app privacy policy.

B.

Implement application hardening measures.

C.

Provide the app only through official app stores

D.

Conduct penetration testing

Buy Now
Questions 24

Which of the following is the GREATEST benefit of adopting data minimization practices?

Options:

A.

Storage and encryption costs are reduced.

B.

Data retention efficiency is enhanced.

C.

The associated threat surface is reduced.

D.

Compliance requirements are met.

Buy Now
Questions 25

Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?

Options:

A.

To comply with consumer regulatory requirements

B.

To establish privacy breach response procedures

C.

To classify personal data

D.

To understand privacy risks

Buy Now
Questions 26

An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?

Options:

A.

Detecting malicious access through endpoints

B.

Implementing network traffic filtering on endpoint devices

C.

Managing remote access and control

D.

Hardening the operating systems of endpoint devices

Buy Now
Questions 27

An increase in threats originating from endpoints is an indication that:

Options:

A.

network audit frequency should increase.

B.

network protection should be maintained remotely.

C.

extended detection and response should be installed.

D.

credential management should be implemented.

Buy Now
Questions 28

Which of the following is the BEST practice to protect data privacy when disposing removable backup media?

Options:

A.

Data encryption

B.

Data sanitization

C.

Data scrambling

D.

Data masking

Buy Now
Questions 29

Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?

Options:

A.

Data taxonomy

B.

Data classification

C.

Data collection

D.

Data flows

Buy Now
Questions 30

When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

Options:

A.

The data must be protected by multi-factor authentication.

B.

The identifier must be kept separate and distinct from the data it protects.

C.

The key must be a combination of alpha and numeric characters.

D.

The data must be stored in locations protected by data loss prevention (DLP) technology.

Buy Now
Questions 31

A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?

Options:

A.

The third-party workspace is hosted in a highly regulated jurisdiction.

B.

Personal data could potentially be exfiltrated through the virtual workspace.

C.

The organization’s products are classified as intellectual property.

D.

There is a lack of privacy awareness and training among remote personnel.

Buy Now
Questions 32

As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

Options:

A.

Identify sensitive unstructured data at the point of creation.

B.

Classify sensitive unstructured data.

C.

Identify who has access to sensitive unstructured data.

D.

Assign an owner to sensitive unstructured data.

Buy Now
Questions 33

In which of the following should the data record retention period be defined and established?

Options:

A.

Data record model

B.

Data recovery procedures

C.

Data quality standard

D.

Data management plan

Buy Now
Questions 34

Which of the following should be considered personal information?

Options:

A.

Biometric records

B.

Company address

C.

University affiliation

D.

Age

Buy Now
Questions 35

Before executive leadership approves a new data privacy policy, it is MOST important to ensure:

Options:

A.

a training program is developed.

B.

a privacy committee is established.

C.

a distribution methodology is identified.

D.

a legal review is conducted.

Buy Now
Questions 36

Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?

Options:

A.

For the purpose of medical research

B.

A forthcoming campaign to win back customers

C.

A required retention period due to regulations

D.

Ease of onboarding when the customer returns

Buy Now
Questions 37

Which of the following is the MOST effective way to support organizational privacy awareness objectives?

Options:

A.

Funding in-depth training and awareness education for data privacy staff

B.

Implementing an annual training certification process

C.

Including mandatory awareness training as part of performance evaluations

D.

Customizing awareness training by business unit function

Buy Now
Questions 38

Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?

Options:

A.

Develop a data migration plan.

B.

Conduct a legitimate interest analysis (LIA).

C.

Perform a privacy impact assessment (PIA).

D.

Obtain consent from data subjects.

Buy Now
Questions 39

Which of the following is the BEST control to detect potential internal breaches of personal data?

Options:

A.

Data loss prevention (DLP) systems

B.

User behavior analytics tools

C.

Employee background Checks

D.

Classification of data

Buy Now
Questions 40

Which of the following practices BEST indicates an organization follows the data minimization principle?

Options:

A.

Data is pseudonymized when being backed up.

B.

Data is encrypted before storage.

C.

Data is only accessible on a need-to-know basis.

D.

Data is regularly reviewed tor its relevance

Buy Now
Questions 41

What type of personal information can be collected by a mobile application without consent?

Options:

A.

Full name

B.

Geolocation

C.

Phone number

D.

Accelerometer data

Buy Now
Questions 42

Which of the following should be done FIRST when a data collection process is deemed to be a high-level risk?

Options:

A.

Perform a business impact analysis (BIA).

B.

Implement remediation actions to mitigate privacy risk.

C.

Conduct a privacy Impact assessment (PIA).

D.

Create a system of records notice (SORN).

Buy Now
Questions 43

Which of the following is MOST important when developing an organizational data privacy program?

Options:

A.

Obtaining approval from process owners

B.

Profiling current data use

C.

Following an established privacy framework

D.

Performing an inventory of all data

Buy Now
Questions 44

Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?

Options:

A.

Conducting a PIA requires significant funding and resources.

B.

PIAs need to be performed many times in a year.

C.

The organization lacks knowledge of PIA methodology.

D.

The value proposition of a PIA is not understood by management.

Buy Now
Questions 45

Which of the following BEST ensures a mobile application implementation will meet an organization’s data security standards?

Options:

A.

User acceptance testing (UAT)

B.

Data classification

C.

Privacy impact assessment (PIA)

D.

Automatic dynamic code scan

Buy Now
Questions 46

To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.

Options:

A.

general counsel.

B.

database administrator.

C.

business application owner

D.

chief information officer (CIO)

Buy Now
Questions 47

A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?

Options:

A.

Access to personal data is not strictly controlled in development and testing environments.

B.

Complex relationships within and across systems must be retained for testing.

C.

Personal data across the various interconnected systems cannot be easily identified.

D.

Data masking tools are complex and difficult to implement.

Buy Now
Questions 48

Which of the following is the BEST indication of an effective records management program for personal data?

Options:

A.

Archived data is used for future analytics.

B.

The legal department has approved the retention policy.

C.

All sensitive data has been tagged.

D.

A retention schedule is in place.

Buy Now
Questions 49

Which of the following MUST be available to facilitate a robust data breach management response?

Options:

A.

Lessons learned from prior data breach responses

B.

Best practices to obfuscate data for processing and storage

C.

An inventory of previously impacted individuals

D.

An inventory of affected individuals and systems

Buy Now
Questions 50

Which of the following processes BEST enables an organization to maintain the quality of personal data?

Options:

A.

Implementing routine automatic validation

B.

Maintaining hashes to detect changes in data

C.

Encrypting personal data at rest

D.

Updating the data quality standard through periodic review

Buy Now
Questions 51

Which of the following should be established FIRST before authorizing remote access to a data store containing personal data?

Options:

A.

Privacy policy

B.

Network security standard

C.

Multi-factor authentication

D.

Virtual private network (VPN)

Buy Now
Questions 52

Which of the following MOST significantly impacts an organization's ability to respond to data subject access requests?

Options:

A.

The organization's data retention schedule is complex.

B.

Logging of systems and application data is limited.

C.

Third-party service level agreement (SLA) data is not always available.

D.

Availability of application data flow diagrams is limited.

Buy Now
Questions 53

Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?

Options:

A.

Input reference controls

B.

Access controls

C.

Input validation controls

D.

Reconciliation controls

Buy Now
Questions 54

Which of the following is the BEST way to explain the difference between data privacy and data security?

Options:

A.

Data privacy is about data segmentation, while data security prevents unauthorized access.

B.

Data privacy protects the data subjects, while data security is about protecting critical assets.

C.

Data privacy stems from regulatory requirements, while data security focuses on consumer rights.

D.

Data privacy protects users from unauthorized disclosure, while data security prevents compromise.

Buy Now
Questions 55

Which of the following deployed at an enterprise level will MOST effectively block malicious tracking of user Internet browsing?

Options:

A.

Web application firewall (WAF)

B.

Website URL blacklisting

C.

Domain name system (DNS) sinkhole

D.

Desktop antivirus software

Buy Now
Questions 56

A data processor that handles personal data tor multiple customers has decided to migrate its data warehouse to a third-party provider. What is the processor

obligated to do prior to implementation?

Options:

A.

Seek approval from all in-scope data controllers.

B.

Obtain assurance that data subject requests will continue to be handled appropriately

C.

Implement comparable industry-standard data encryption in the new data warehouse

D.

Ensure data retention periods are documented

Buy Now
Questions 57

Which of the following is the BEST way to ensure third-party providers that process an organization's personal data are addressed as part of the data privacy strategy?

Options:

A.

Require data dictionaries from service providers that handle the organization's personal data.

B.

Outsource personal data processing to the same third party

C.

Require independent audits of the providers' data privacy controls

D.

Require service level agreements (SLAs) to ensure data integrity while safeguarding confidentiality

Buy Now
Questions 58

Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?

Options:

A.

Approving privacy impact assessments (PIAs)

B.

Validating the privacy framework

C.

Managing privacy notices provided to customers

D.

Establishing employee privacy rights and consent

Buy Now
Questions 59

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

Options:

A.

Gaining consent when information is collected

B.

Publishing a privacy notice

C.

Mailing rights documentation to customers

D.

Distributing a privacy rights policy

Buy Now
Questions 60

An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?

Options:

A.

Height, weight, and activities

B.

Sleep schedule and calorie intake

C.

Education and profession

D.

Race, age, and gender

Buy Now
Questions 61

Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?

Options:

A.

Data masking

B.

Data truncation

C.

Data encryption

D.

Data minimization

Buy Now
Questions 62

What is the BEST way for an organization to maintain the effectiveness of its privacy breach incident response plan?

Options:

A.

Require security management to validate data privacy security practices.

B.

Involve the privacy office in an organizational review of the incident response plan.

C.

Hire a third party to perform a review of data privacy processes.

D.

Conduct annual data privacy tabletop exercises.

Buy Now
Questions 63

Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?

Options:

A.

Data custodian

B.

Privacy data analyst

C.

Data processor

D.

Data owner

Buy Now
Questions 64

Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?

Options:

A.

Review the privacy policy.

B.

Obtain independent assurance of current practices.

C.

Re-assess the information security requirements.

D.

Validate contract compliance.

Buy Now
Questions 65

Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?

Options:

A.

Encrypt the data at rest.

B.

De-identify the data.

C.

Use a unique hashing algorithm.

D.

Require a digital signature.

Buy Now
Exam Code: CDPSE
Exam Name: Certified Data Privacy Solutions Engineer
Last Update: Nov 21, 2024
Questions: 218
CDPSE pdf

CDPSE PDF

$28  $80
CDPSE Engine

CDPSE Testing Engine

$33.25  $95
CDPSE PDF + Engine

CDPSE PDF + Testing Engine

$45.5  $130