Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

CDPSE Questions and Answers

Question # 6

Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?

A.

Require an annual internal audit of SDLC processes.

B.

Include qualified application security personnel as part of the process.

C.

Ensure comprehensive application security testing immediately prior to release.

D.

Require an annual third-party audit of new client software solutions.

Full Access
Question # 7

Which of the following helps define data retention time is a stream-fed data lake that includes personal data?

A.

Information security assessments

B.

Privacy impact assessments (PIAs)

C.

Data privacy standards

D.

Data lake configuration

Full Access
Question # 8

Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?

A.

To educate data subjects regarding how personal data will be safeguarded

B.

To inform customers about the procedure to legally file complaints for misuse of personal data

C.

To provide transparency to the data subject on the intended use of their personal data

D.

To establish the organization's responsibility for protecting personal data during the relationship with the data subject

Full Access
Question # 9

Which of the following BEST enables an IT privacy practitioner to ensure appropriate protection for personal data collected that is required to provide necessary services?

A.

Understanding the data flows within the organization

B.

Implementing strong access controls on a need-to-know basis

C.

Anonymizing privacy data during collection and recording

D.

Encrypting the data throughout its life cycle

Full Access
Question # 10

A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?

A.

The third-party workspace is hosted in a highly regulated jurisdiction.

B.

Personal data could potentially be exfiltrated through the virtual workspace.

C.

The organization’s products are classified as intellectual property.

D.

There is a lack of privacy awareness and training among remote personnel.

Full Access
Question # 11

When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

A.

The data must be protected by multi-factor authentication.

B.

The identifier must be kept separate and distinct from the data it protects.

C.

The key must be a combination of alpha and numeric characters.

D.

The data must be stored in locations protected by data loss prevention (DLP) technology.

Full Access
Question # 12

Which of the following is the BEST course of action to prevent false positives from data loss prevention (DLP) tools?

A.

Conduct additional discovery scans.

B.

Suppress the alerts generating the false positives.

C.

Evaluate new data loss prevention (DLP) tools.

D.

Re-establish baselines tor configuration rules

Full Access
Question # 13

When using anonymization techniques to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

A.

The key must be kept separate and distinct from the data it protects.

B.

The data must be protected by multi-factor authentication.

C.

The key must be a combination of alpha and numeric characters.

D.

The data must be stored in locations protected by data loss prevention (DLP) technology.

Full Access
Question # 14

An organization has an initiative to implement database encryption to strengthen privacy controls. Which of the following is the MOST useful information for prioritizing database selection?

A.

Database administration audit logs

B.

Historical security incidents

C.

Penetration test results

D.

Asset classification scheme

Full Access
Question # 15

A health organization experienced a breach of a database containing pseudonymized personal data. Which of the following should be of MOST concern to the IT privacy practitioner?

A.

The data may be re-identified.

B.

The data was proprietary.

C.

The data was classified as confidential.

D.

The data is subject to regulatory fines.

Full Access
Question # 16

Which of the following BEST ensures an effective data privacy policy is implemented?

A.

Developing a clear privacy statement with documented objectives

B.

Incorporating data privacy regulations from all jurisdictions

C.

Aligning regulatory requirements with business needs

D.

Providing a comprehensive review of the policy for all business units

Full Access
Question # 17

Data collected by a third-party vendor and provided back to the organization may not be protected according to the organization’s privacy notice. Which of the following is the BEST way to address this concern?

A.

Review the privacy policy.

B.

Obtain independent assurance of current practices.

C.

Re-assess the information security requirements.

D.

Validate contract compliance.

Full Access
Question # 18

Which of the following is the BEST way to limit the organization’s potential exposure in the event of consumer data loss while maintaining the traceability of the data?

A.

Encrypt the data at rest.

B.

De-identify the data.

C.

Use a unique hashing algorithm.

D.

Require a digital signature.

Full Access
Question # 19

Which of the following practices BEST indicates an organization follows the data minimization principle?

A.

Data is pseudonymized when being backed up.

B.

Data is encrypted before storage.

C.

Data is only accessible on a need-to-know basis.

D.

Data is regularly reviewed tor its relevance

Full Access
Question # 20

Which of the following is the MOST important attribute of a privacy policy?

    Breach notification period

A.

Data retention period

B.

Transparency

C.

Language localization

Full Access
Question # 21

A global organization is planning to implement a customer relationship management (CRM) system to be used in offices based in multiple countries. Which of the following is the MOST important data protection consideration for this project?

A.

Industry best practice related to information security standards in each relevant jurisdiction

B.

Identity and access management mechanisms to restrict access based on need to know

C.

Encryption algorithms for securing customer personal data at rest and in transit

D.

National data privacy legislative and regulatory requirements in each relevant jurisdiction

Full Access
Question # 22

Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?

A.

To provide transparency to the data subject on the intended use of their personal data

B.

To educate data subjects regarding how personal data will be safeguarded

C.

To establish the organization’s responsibility for protecting personal data during the relationship with the data subject

D.

To inform customers about the procedure to legally file complaints for misuse of personal data

Full Access
Question # 23

An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?

A.

Anonymize personal data.

B.

Discontinue the creation of profiles.

C.

Implement strong access controls.

D.

Encrypt data at rest.

Full Access
Question # 24

Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?

A.

Conducting a PIA requires significant funding and resources.

B.

PIAs need to be performed many times in a year.

C.

The organization lacks knowledge of PIA methodology.

D.

The value proposition of a PIA is not understood by management.

Full Access
Question # 25

Which of the following helps define data retention time in a stream-fed data lake that includes personal data?

A.

Privacy impact assessments (PIAs)

B.

Data lake configuration

C.

Data privacy standards

D.

Information security assessments

Full Access
Question # 26

Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?

A.

The system architecture is clearly defined.

B.

A risk assessment has been completed.

C.

Security controls are clearly defined.

D.

Data protection requirements are included.

Full Access
Question # 27

Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?

A.

End users using weak passwords

B.

Organizations using weak encryption to transmit data

C.

Vulnerabilities existing in authentication pages

D.

End users forgetting their passwords

Full Access
Question # 28

Which of the following should be considered personal information?

A.

Biometric records

B.

Company address

C.

University affiliation

D.

Age

Full Access
Question # 29

Which of the following observations should be of MOST concern to an IT privacy practitioner during an evaluation of an organization’s privacy practices?

A.

Employee records are maintained on a shared drive

B.

Email is sent out without a data classification label

C.

Third-party service desk staff can view limited customer data

D.

Tokens for personally identifiable data are stored as database fields

Full Access
Question # 30

Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

A.

The user’s ability to select, filter, and transform data before it is shared

B.

Umbrella consent for multiple applications by the same developer

C.

User consent to share personal data

D.

Unlimited retention of personal data by third parties

Full Access
Question # 31

Which of the following is considered a privacy-enhancing technology (PET)?

A.

Public key infrastructure (PKI) for secure authentication

B.

Blockchain for decentralized data storage

C.

AI solutions that generate synthetic data

D.

Privacy-enhanced identity management systems

Full Access
Question # 32

During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?

A.

Functional testing

B.

Development

C.

Production

D.

User acceptance testing (UAT)

Full Access
Question # 33

An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?

A.

Height, weight, and activities

B.

Sleep schedule and calorie intake

C.

Education and profession

D.

Race, age, and gender

Full Access
Question # 34

When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?

A.

Data classification labeling

B.

Data residing in another country

C.

Volume of data stored

D.

Privacy training for backup users

Full Access
Question # 35

Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?

A.

Data custodian

B.

Privacy data analyst

C.

Data processor

D.

Data owner

Full Access
Question # 36

Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?

A.

Trusted zone

B.

Clean zone

C.

Raw zone

D.

Temporal zone

Full Access
Question # 37

What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?

A.

Distributing a privacy rights policy

B.

Mailing rights documentation to customers

C.

Publishing a privacy notice

D.

Gaining consent when information is collected

Full Access
Question # 38

Which of the following is the BEST approach when providing data subjects with access to their personal data?

A.

Only allow users to edit data fields that are not derived from their personal information

B.

Use an email address to automatically generate a unique ID

C.

Create a profile page where users can view their information

D.

Disable user profile data modification so there is no possibility to introduce mistakes

Full Access
Question # 39

Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?

A.

Offline backup availability

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Online backup frequency

Full Access
Question # 40

Which of the following is the BEST way to reduce the risk of compromise when transferring personal information using email?

A.

Centrally managed encryption

B.

End user-managed encryption

C.

Private cloud storage space

D.

Password-protected .zip files

Full Access
Question # 41

When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?

A.

Encoding

B.

Backup

C.

Encryption

D.

Classification

Full Access
Question # 42

Which of the following needs to be identified FIRST to define the privacy requirements to use when assessing the selection of IT systems?

    Type of data being processed

A.

Applicable privacy legislation

B.

Applicable control frameworks

C.

Available technology platforms

Full Access
Question # 43

Which of the following is the MOST important reason for an organization to establish a framework for privacy audits?

A.

To confirm the effectiveness of the privacy program

B.

To provide insight to historical privacy breaches and incidents

C.

To maximize audit staff attention on the highest risks

D.

To benchmark against historical information and trends

Full Access
Question # 44

An organization’s data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?

A.

Low-level formatting

B.

Remote partitioning

C.

Degaussing

D.

Hammer strike

Full Access
Question # 45

Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?

A.

It uses Transport Layer Security (TLS).

B.

It provides a secure connection on an insecure network

C.

It makes public key cryptography feasible.

D.

It contains schemes for revoking keys.

Full Access
Question # 46

Using hash values With stored personal data BEST enables an organization to

A.

protect against unauthorized access.

B.

detect changes to the data.

C.

ensure data indexing performance.

D.

tag the data with classification information

Full Access
Question # 47

What type of personal information can be collected by a mobile application without consent?

A.

Full name

B.

Geolocation

C.

Phone number

D.

Accelerometer data

Full Access
Question # 48

Which of the following poses the GREATEST privacy risk for client-side application processing?

A.

Failure of a firewall protecting the company network

B.

An employee loading personal information on a company laptop

C.

A remote employee placing communication software on a company server

D.

A distributed denial of service attack (DDoS) on the company network

Full Access
Question # 49

Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?

A.

The data is encrypted and a key is required to re-identify the data.

B.

Key fields are hidden and unmasking is required to access to the data.

C.

Names and addresses are removed but the rest of the data is left untouched.

D.

The data is transformed such that re-identification is impossible.

Full Access
Question # 50

Which of the following information would MOST likely be considered sensitive personal data?

A.

Mailing address

B.

Bank account login ID

C.

Ethnic origin

D.

Contact phone number

Full Access
Question # 51

Senior management is concerned about data privacy risk resulting from the current use of duplicative technologies. Which of the following is the BEST way to prevent this problem in the future?

A.

Establish an enterprise architecture (EA) management team

B.

Establish a data privacy committee

C.

Ensure penetration testing is regularly conducted

D.

Ensure sufficient training is conducted for new technologies

Full Access
Question # 52

Which of the following BEST ensures data confidentiality across databases?

A.

Logical data model

B.

Data normalization

C.

Data catalog vocabulary

D.

Data anonymization

Full Access
Question # 53

Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?

A.

Changes to current information architecture

B.

Updates to data life cycle policy

C.

Business impact due to the changes

D.

Modifications to data quality standards

Full Access
Question # 54

Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?

A.

Develop and communicate a data security plan.

B.

Perform a privacy impact assessment (PIA).

C.

Ensure strong encryption is used.

D.

Conduct a security risk assessment.

Full Access
Question # 55

An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is

BEST used to identity and review the application's runtime modules?

A.

Static application security testing (SAST)

B.

Dynamic application security testing (DAST)

C.

Regression testing

D.

Software composition analysis

Full Access
Question # 56

Which of the following is the GREATEST privacy risk associated with the use of application programming interfaces (APIs)?

A.

APIs are costly to assess and monitor.

B.

API keys could be stored insecurely.

C.

APIs are complex to build and test

D.

APIS could create an unstable environment

Full Access
Question # 57

Which of the following is the PRIMARY reason for an organization to use hash functions when hardening application systems involved in biometric data processing?

A.

To reduce the risk of sensitive data breaches

B.

To meet the organization's security baseline

C.

To ensure technical security measures are effective

D.

To prevent possible identity theft

Full Access
Question # 58

Which of the following is MOST suitable for facilitating and reporting to senior management on the enterprise privacy posture over time?

A.

Enterprise metadata inventory

B.

Privacy impact assessment (PIA)

C.

Vulnerability assessment results

D.

Continuous monitoring dashboards

Full Access
Question # 59

Which of the following is the PRIMARY reason to complete a privacy impact assessment (PIA)?

A.

To comply with consumer regulatory requirements

B.

To establish privacy breach response procedures

C.

To classify personal data

D.

To understand privacy risks

Full Access
Question # 60

Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?

A.

Chief data officer (CDO)

B.

Privacy steering committee

C.

Information security steering committee

D.

Chief privacy officer (CPO)

Full Access
Question # 61

Which of the following is the MOST important action to protect a mobile banking app and its data against manipulation and disclosure?

A.

Define the mobile app privacy policy.

B.

Implement application hardening measures.

C.

Provide the app only through official app stores

D.

Conduct penetration testing

Full Access
Question # 62

Which of the following is a responsibility of the audit function in helping an organization address privacy compliance requirements?

A.

Approving privacy impact assessments (PIAs)

B.

Validating the privacy framework

C.

Managing privacy notices provided to customers

D.

Establishing employee privacy rights and consent

Full Access
Question # 63

Which of the following describes a user’s “right to be forgotten”?

A.

The data is being used to comply with legal obligations or the public interest.

B.

The data is no longer required for the purpose originally collected.

C.

The individual objects despite legitimate grounds for processing.

D.

The individual’s legal residence status has recently changed.

Full Access
Question # 64

An increase in threats originating from endpoints is an indication that:

A.

network audit frequency should increase.

B.

network protection should be maintained remotely.

C.

extended detection and response should be installed.

D.

credential management should be implemented.

Full Access
Question # 65

Which of the following is BEST used to validate compliance with agreed-upon service levels established with a third party that processes personal data?

A.

Key risk indicators (KRIs)

B.

Key performance indicators (KPIS)

C.

Industry benchmarks

D.

Contractual right to audit

Full Access
Question # 66

Which of the following is MOST important to review before using an application programming interface (API) to help mitigate related privacy risk?

A.

Data taxonomy

B.

Data classification

C.

Data collection

D.

Data flows

Full Access
Question # 67

Which of the following is a PRIMARY element of application and software hardening?

A.

Vulnerability analysis

B.

Database configuration

C.

Code review

D.

Software repository

Full Access
Question # 68

As part of a major data discovery initiative to identify personal data across the organization, the project team has identified the proliferation of personal data held as unstructured data as a major risk. What should be done FIRST to address this situation?

A.

Identify sensitive unstructured data at the point of creation.

B.

Classify sensitive unstructured data.

C.

Identify who has access to sensitive unstructured data.

D.

Assign an owner to sensitive unstructured data.

Full Access
Question # 69

To ensure effective management of an organization’s data privacy policy, senior leadership MUST define:

A.

training and testing requirements for employees handling personal data.

B.

roles and responsibilities of the person with oversights.

C.

metrics and outcomes recommended by external agencies.

D.

the scope and responsibilities of the data owner.

Full Access
Question # 70

Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?

A.

Online behavioral tracking

B.

Radio frequency identification (RFID)

C.

Website cookies

D.

Beacon-based tracking

Full Access
Question # 71

Which of the following is the MOST important consideration when choosing a method for data destruction?

A.

Granularity of data to be destroyed

B.

Validation and certification of data destruction

C.

Time required for the chosen method of data destruction

D.

Level and strength of current data encryption

Full Access
Question # 72

Which of the following is the GREATEST benefit of adopting data minimization practices?

A.

Storage and encryption costs are reduced.

B.

Data retention efficiency is enhanced.

C.

The associated threat surface is reduced.

D.

Compliance requirements are met.

Full Access
Question # 73

Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?

A.

Access is logged on the virtual private network (VPN).

B.

Multi-factor authentication is enabled.

C.

Active remote access is monitored.

D.

Access is only granted to authorized users.

Full Access
Question # 74

When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?

A.

Co-regulatory

B.

Sectoral

C.

Comprehensive

D.

Self-regulatory

Full Access