Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CDPSE Exam Dumps - Isaca Certification Questions and Answers

Question # 14

Which of the following helps define data retention time in a stream-fed data lake that includes personal data?

Options:

A.

Privacy impact assessments (PIAs)

B.

Data lake configuration

C.

Data privacy standards

D.

Information security assessments

Buy Now
Question # 15

Which of the following is the BEST way to manage different IT staff access permissions for personal data within an organization?

Options:

A.

Mandatory access control

B.

Network segmentation

C.

Dedicated access system

D.

Role-based access control

Buy Now
Question # 16

Which of the following approaches to incorporating privacy by design principles BEST ensures the privacy of personal information?

Options:

A.

Implementing the principles into the end-to-end data life cycle

B.

Including the principles in reactive data breach plans

C.

Embedding the principles into remediation data procedures

D.

Building the principles into final data product developments

Buy Now
Question # 17

Which of the following MUST be available to facilitate a robust data breach management response?

Options:

A.

Lessons learned from prior data breach responses

B.

Best practices to obfuscate data for processing and storage

C.

An inventory of previously impacted individuals

D.

An inventory of affected individuals and systems

Buy Now
Question # 18

Which of the following is the BEST practice to protect data privacy when disposing removable backup media?

Options:

A.

Data encryption

B.

Data sanitization

C.

Data scrambling

D.

Data masking

Buy Now
Question # 19

Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?

Options:

A.

Limited functions and capabilities of a secured operating environment

B.

Monitored network activities for unauthorized use

C.

Improved data integrity and reduced effort for privacy audits

D.

Unlimited functionalities and highly secured applications

Buy Now
Question # 20

Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?

Options:

A.

To reduce the risk of sensitive data breaches

B.

To meet the organization's security baseline

C.

To ensure technical security measures are effective

D.

To prevent possible identity theft

Buy Now
Question # 21

It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?

Options:

A.

Application design

B.

Requirements definition

C.

Implementation

D.

Testing

Buy Now
Question # 22

Which of the following is the BEST way to protect the privacy of data stored on a laptop in case of loss or theft?

Options:

A.

Strong authentication controls

B.

Remote wipe

C.

Regular backups

D.

Endpoint encryption

Buy Now
Question # 23

A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?

Options:

A.

Discretionary access control (DAC)

B.

Attribute-based access control (ABAC)

C.

Provision-based access control (PBAC)

D.

Mandatory access control (MAC)

Buy Now
Exam Code: CDPSE
Exam Name: Certified Data Privacy Solutions Engineer
Last Update: Sep 19, 2025
Questions: 247
CDPSE pdf

CDPSE PDF

$29.75  $84.99
CDPSE Engine

CDPSE Testing Engine

$33.25  $94.99
CDPSE PDF + Engine

CDPSE PDF + Testing Engine

$47.25  $134.99