During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?
Answer(s): B
Which of the following is the PRIMARY reason that organizations need to map the data ows of personal data?
Answer(s): A
Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
Answer(s): D
Post your Comments and Discuss ISACA CDPSE exam with other Community members:
noni commented on November 23, 2023 looking forward to it Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the CDPSE content, but please register or login to continue.