Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CDPSE Questions and Answers

Question # 6

Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?

A.

Skills training programs

B.

Awareness campaigns

C.

Performance evaluations

D.

Code of conduct principles

Full Access
Question # 7

Which of the following should be considered personal information?

A.

Biometric records

B.

Company address

C.

University affiliation

D.

Age

Full Access
Question # 8

Which of the following is the MOST important consideration for developing data retention requirements?

A.

Industry guidelines

B.

Cost-benefit analysis

C.

Data classification rules

D.

Applicable regulations

Full Access
Question # 9

An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption

keys?

A.

Ensure key management responsibility is assigned to the privacy officer.

B.

Ensure the keys are stored in a remote server.

C.

Ensure the keys are stored in a cryptographic vault.

D.

Ensure all access to the keys is under dual control_

Full Access
Question # 10

Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?

A.

Detailed documentation of data privacy processes

B.

Strategic goals of the organization

C.

Contract requirements for independent oversight

D.

Business objectives of senior leaders

Full Access
Question # 11

When contracting with a Software as a Service (SaaS) provider, which of the following is the MOST important contractual requirement to ensure data privacy at service termination?

A.

Encryption of customer data

B.

Removal of customer data

C.

De-identification of customer data

D.

Destruction of customer data

Full Access
Question # 12

Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?

A.

Define the mobile app privacy policy.

B.

Implement application hardening measures.

C.

Provide the app only through official app stores

D.

Conduct penetration testing

Full Access
Question # 13

Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?

A.

Set a unique static IP for the default network interface.

B.

Disable all wireless networking in the group policy.

C.

Reinstall the operating system and enable laptop encryption.

D.

Perform a full wipe and reimage of the laptops.

Full Access
Question # 14

Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?

A.

Implement a data loss prevention (DLP) solution.

B.

Review historical privacy incidents in the organization.

C.

Monitor inbound and outbound communications.

D.

Perform an analysis of known threats.

Full Access
Question # 15

When configuring information systems for the communication and transport of personal data, an organization should:

A.

adopt the default vendor specifications.

B.

review configuration settings for compliance.

C.

implement the least restrictive mode.

D.

enable essential capabilities only.

Full Access
Question # 16

Which of the following poses the GREATEST privacy risk for client-side application processing?

A.

Failure of a firewall protecting the company network

B.

An employee loading personal information on a company laptop

C.

A remote employee placing communication software on a company server

D.

A distributed denial of service attack (DDoS) on the company network

Full Access
Question # 17

Which of the following is the BEST practice to protect data privacy when disposing removable backup media?

A.

Data encryption

B.

Data sanitization

C.

Data scrambling

D.

Data masking

Full Access
Question # 18

Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?

A.

Conducting a PIA requires significant funding and resources.

B.

PIAs need to be performed many times in a year.

C.

The organization lacks knowledge of PIA methodology.

D.

The value proposition of a PIA is not understood by management.

Full Access
Question # 19

Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?

A.

Develop and communicate a data security plan.

B.

Perform a privacy impact assessment (PIA).

C.

Ensure strong encryption is used.

D.

Conduct a security risk assessment.

Full Access
Question # 20

Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?

A.

The system architecture is clearly defined.

B.

A risk assessment has been completed.

C.

Security controls are clearly defined.

D.

Data protection requirements are included.

Full Access
Question # 21

Which of the following is the BEST way to address threats to mobile device privacy when using beacons as a tracking technology?

A.

Disable location services.

B.

Disable Bluetooth services.

C.

Enable Trojan scanners.

D.

Enable antivirus for mobile devices.

Full Access
Question # 22

Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?

A.

To comply with consumer regulatory requirements

B.

To establish privacy breach response procedures

C.

To classify personal data

D.

To understand privacy risks

Full Access
Question # 23

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Gaining consent when information is collected

B.

Publishing a privacy notice

C.

Mailing rights documentation to customers

D.

Distributing a privacy rights policy

Full Access
Question # 24

During the design of a role-based user access model for a new application, which of the following principles is MOST important to ensure data privacy is protected?

A.

Segregation of duties

B.

Unique user credentials

C.

Two-person rule

D.

Need-to-know basis

Full Access
Question # 25

Which of the following should be done NEXT after a privacy risk has been accepted?

A.

Monitor the risk landscape for material changes.

B.

Determine the risk appetite With management.

C.

Adjust the risk rating to help ensure it is remediated

D.

Reconfirm the risk during the next reporting period

Full Access
Question # 26

Which of the following has the GREATEST impact on the treatment of data within the scope of an organization's privacy policy?

A.

Data protection impact assessment (DPIA)

B.

Data flow diagram

C.

Data classification

D.

Data processing agreement

Full Access
Question # 27

Critical data elements should be mapped to which of the following?

A.

Data process flow

B.

Business analytics

C.

Business taxonomy

D.

Privacy policy

Full Access
Question # 28

Which of the following information would MOST likely be considered sensitive personal data?

A.

Mailing address

B.

Bank account login ID

C.

Ethnic origin

D.

Contact phone number

Full Access
Question # 29

Which authentication practice is being used when an organization requires a photo on a government-issued identification card to validate an in-person credit card purchase?

A.

Possession factor authentication

B.

Knowledge-based credential authentication

C.

Multi-factor authentication

D.

Biometric authentication

Full Access
Question # 30

When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?

A.

Data classification labeling

B.

Data residing in another country

C.

Volume of data stored

D.

Privacy training for backup users

Full Access
Question # 31

Which of the following is the BEST method of data sanitization when there is a need to balance the destruction of data and the ability to recycle IT assets?

A.

Cryptographic erasure

B.

Factory reset

C.

Data deletion

D.

Degaussing

Full Access
Question # 32

Which of the following is the BEST course of action to prevent false positives from data loss prevention (DLP) tools?

A.

Conduct additional discovery scans.

B.

Suppress the alerts generating the false positives.

C.

Evaluate new data loss prevention (DLP) tools.

D.

Re-establish baselines tor configuration rules

Full Access
Question # 33

Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?

A.

Integrating security and privacy control requirements into the development of risk scenarios

B.

Prioritizing privacy-related risk scenarios as part of enterprise risk management ERM) processes

C.

Using a top-down approach to develop privacy-related risk scenarios for the organization

D.

Assigning the data protection officer accountability for privacy protection controls

Full Access
Question # 34

Which of the following helps define data retention time is a stream-fed data lake that includes personal data?

A.

Information security assessments

B.

Privacy impact assessments (PIAs)

C.

Data privacy standards

D.

Data lake configuration

Full Access
Question # 35

A global financial institution is implementing data masking technology to protect personal data used for testing purposes in non-production environments. Which of the following is the GREATEST challenge in this situation?

A.

Access to personal data is not strictly controlled in development and testing environments.

B.

Complex relationships within and across systems must be retained for testing.

C.

Personal data across the various interconnected systems cannot be easily identified.

D.

Data masking tools are complex and difficult to implement.

Full Access
Question # 36

Which of the following rights is an important consideration that allows data subjects to request the deletion of their data?

A.

The right to object

B.

The right to withdraw consent

C.

The right to access

D.

The right to be forgotten

Full Access
Question # 37

Which of the following is the GREATEST benefit of adopting data minimization practices?

A.

Storage and encryption costs are reduced.

B.

Data retention efficiency is enhanced.

C.

The associated threat surface is reduced.

D.

Compliance requirements are met.

Full Access
Question # 38

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Distributing a privacy rights policy

B.

Mailing rights documentation to customers

C.

Publishing a privacy notice

D.

Gaining consent when information is collected

Full Access
Question # 39

Which types of controls need to be applied to ensure accuracy at all stages of processing, storage, and deletion throughout the data life cycle?

A.

Processing flow controls

B.

Time-based controls

C.

Purpose limitation controls

D.

Integrity controls

Full Access
Question # 40

Which of the following is the PRIMARY reason that organizations need to map the data flows of personal data?

A.

To assess privacy risks

B.

To evaluate effectiveness of data controls

C.

To determine data integration gaps

D.

To comply with regulations

Full Access
Question # 41

Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?

A.

Providing system engineers the ability to search and retrieve data

B.

Allowing individuals to have direct access to their data

C.

Allowing system administrators to manage data access

D.

Establishing a data privacy customer service bot for individuals

Full Access
Question # 42

Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?

A.

Data taxonomy

B.

Data classification

C.

Data collection

D.

Data flows

Full Access
Question # 43

Which of the following is the MOST important privacy consideration for video surveillance in high security areas?

A.

Video surveillance recordings may only be viewed by the organization.

B.

Those affected must be informed of the video surveillance_

C.

There is no limitation for retention of this data.

D.

Video surveillance data must be stored in encrypted format.

Full Access
Question # 44

Which of the following BEST represents privacy threat modeling methodology?

A.

Mitigating inherent risks and threats associated with privacy control weaknesses

B.

Systematically eliciting and mitigating privacy threats in a software architecture

C.

Reliably estimating a threat actor’s ability to exploit privacy vulnerabilities

D.

Replicating privacy scenarios that reflect representative software usage

Full Access
Question # 45

Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?

A.

Approving privacy impact assessments (PIAs)

B.

Validating the privacy framework

C.

Managing privacy notices provided to customers

D.

Establishing employee privacy rights and consent

Full Access
Question # 46

When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?

A.

Encoding

B.

Backup

C.

Encryption

D.

Classification

Full Access
Question # 47

Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?

A.

Encrypt the data at rest.

B.

De-identify the data.

C.

Use a unique hashing algorithm.

D.

Require a digital signature.

Full Access
Question # 48

A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows

users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?

A.

Client-side device ID

B.

Data storage requirements

C.

Encryption of key data elements

D.

Data usage without consent

Full Access
Question # 49

Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?

A.

Data custodian

B.

Privacy data analyst

C.

Data processor

D.

Data owner

Full Access
Question # 50

Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?

A.

Compartmentalizing resource access

B.

Regular testing of system backups

C.

Monitoring and reviewing remote access logs

D.

Regular physical and remote testing of the incident response plan

Full Access
Question # 51

Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?

A.

Limited functions and capabilities of a secured operating environment

B.

Monitored network activities for unauthorized use

C.

Improved data integrity and reduced effort for privacy audits

D.

Unlimited functionalities and highly secured applications

Full Access
Question # 52

Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?

A.

Understanding the data flows within the organization

B.

Implementing strong access controls on a need-to-know basis

C.

Anonymizing privacy data during collection and recording

D.

Encrypting the data throughout its life cycle

Full Access
Question # 53

Which of the following is the BEST indication of a highly effective privacy training program?

A.

Members of the workforce understand their roles in protecting data privacy

B.

Recent audits have no findings or recommendations related to data privacy

C.

No privacy incidents have been reported in the last year

D.

HR has made privacy training an annual mandate for the organization_

Full Access
Question # 54

Which of the following is the best way to reduce the risk of compromised credentials when an organization allows employees to have remote access?

A.

Enable whole disk encryption on remote devices.

B.

Purchase an endpoint detection and response (EDR) tool.

C.

Implement multi-factor authentication.

D.

Deploy single sign-on with complex password requirements.

Full Access
Question # 55

Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?

A.

Encrypting APIs with the organization’s private key

B.

Requiring nondisclosure agreements (NDAs) when sharing APIs

C.

Restricting access to authorized users

D.

Sharing only digitally signed APIs

Full Access
Question # 56

Which of the following activities would BEST enable an organization to identify gaps in its privacy posture?

A.

Retargeting employees for awareness training after a social engineering attack

B.

Conducting a simulation exercise that requires participants to respond to a privacy incident

C.

Providing an interactive session on privacy risks at an organization-wide meeting

D.

Requiring employees to review the organization's privacy policy on an annual basis

Full Access
Question # 57

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

A.

Server details of the hosting environment

B.

Last logins of privileged users

C.

Last user who accessed personal data

D.

Application error events

Full Access
Question # 58

An organization has a policy requiring the encryption of personal data if transmitted through email. Which of the following is the BEST control to ensure the effectiveness of this policy?

A.

Provide periodic user awareness training on data encryption.

B.

Implement a data loss prevention (DLP) tool.

C.

Conduct regular control self-assessments (CSAs).

D.

Enforce annual attestation to policy compliance.

Full Access
Question # 59

Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?

A.

Review the privacy policy.

B.

Obtain independent assurance of current practices.

C.

Re-assess the information security requirements.

D.

Validate contract compliance.

Full Access
Question # 60

Which of the following helps to ensure the identities of individuals in two-way communication are verified?

A.

Virtual private network (VPN)

B.

Transport Layer Security (TLS)

C.

Mutual certificate authentication

D.

Secure Shell (SSH)

Full Access
Question # 61

Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?

A.

The service provider has denied the organization’s request for right to audit.

B.

Personal data stored on the cloud has not been anonymized.

C.

The extent of the service provider’s access to data has not been established.

D.

The data is stored in a region with different data protection requirements.

Full Access
Question # 62

Which of the following hard drive sanitation methods provides an organization with the GREATEST level of assurance that data has been permanently erased?

A.

Degaussing the drive

B.

Factory resetting the drive

C.

Crypto-shredding the drive

D.

Reformatting the drive

Full Access
Question # 63

Which of the following is a foundational goal of data privacy laws?

A.

Privacy laws are designed to protect companies' collection of personal data

B.

Privacy laws are designed to prevent the collection of personal data

C.

Privacy laws are designed to provide transparency for the collection of personal data

D.

Privacy laws are designed to give people rights over the collection of personal data

Full Access
Question # 64

Which of the following helps to ensure the identities of individuals in a two-way communication are verified?

A.

Virtual private network (VPN)

B.

Secure Shell (SSH)

C.

Transport Layer Security (TLS)

D.

Mutual certificate authentication

Full Access
Question # 65

Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?

A.

The application only stores data locally.

B.

The application shares personal information upon request.

C.

The application only stores data for 24 hours.

D.

The application requires consent before sharing locations.

Full Access