Free CDPSE Exam Braindumps (page: 14)

Page 14 of 56

During which of the following system lifecycle stages is it BEST to conduct a privacy impact assessment (PIA) on a system that holds personal data?

  1. Functional testing
  2. Development
  3. Production
  4. User acceptance testing (UAT)

Answer(s): B



Which of the following is the PRIMARY reason that organizations need to map the data ows of personal data?

  1. To assess privacy risks
  2. To evaluate effectiveness of data controls
  3. To determine data integration gaps
  4. To comply with regulations

Answer(s): A



Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?

  1. Whole disk encryption
  2. Asymmetric encryption
  3. Digital signature
  4. Symmetric encryption

Answer(s): B



When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?

  1. The data must be protected by multi-factor authentication.
  2. The identi er must be kept separate and distinct from the data it protects.
  3. The key must be a combination of alpha and numeric characters.
  4. The data must be stored in locations protected by data loss prevention (DLP) technology.

Answer(s): D



Page 14 of 56



Post your Comments and Discuss ISACA CDPSE exam with other Community members:

noni commented on November 23, 2023
looking forward to it
Anonymous
upvote