Free CDPSE Exam Braindumps (page: 13)

Page 13 of 56

Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?

  1. Private key exposure
  2. Poor patch management
  3. Lack of password complexity
  4. Out-of-date antivirus signatures

Answer(s): A



Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?

  1. Changes to current information architecture
  2. Updates to data life cycle policy
  3. Business impact due to the changes
  4. Modi cations to data quality standards

Answer(s): B



Which of the following techniques mitigates design aws in the application development process that may contribute to potential leakage of personal data?

  1. User acceptance testing (UAT)
  2. Patch management
  3. Software hardening
  4. Web application rewall (WAF)

Answer(s): A



Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?

  1. It eliminates cryptographic key collision.
  2. It minimizes the risk if the cryptographic key is compromised.
  3. It is more practical and e cient to use a single cryptographic key.
  4. Each process can only be supported by its own unique key management process.

Answer(s): B



Page 13 of 56



Post your Comments and Discuss ISACA CDPSE exam with other Community members:

noni commented on November 23, 2023
looking forward to it
Anonymous
upvote