Free CDPSE Exam Braindumps (page: 29)

Page 29 of 56

Which of the following should be done FIRST to establish privacy by design when developing a contact-tracing application?

  1. Conduct a privacy impact assessment (PIA).
  2. Conduct a development environment review.
  3. Identify privacy controls for the application.
  4. Identify differential privacy techniques.

Answer(s): D



A software development organization with remote personnel has implemented a third-party virtualized workspace to allow the teams to collaborate.
Which of the following should be of GREATEST concern?

  1. The third-party workspace is hosted in a highly regulated jurisdiction.
  2. Personal data could potentially be ex ltrated through the virtual workspace.
  3. The organization's products are classi ed as intellectual property.
  4. There is a lack of privacy awareness and training among remote personnel.

Answer(s): A



Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

  1. The user's ability to select, lter, and transform data before it is shared
  2. Umbrella consent for multiple applications by the same developer
  3. User consent to share personal data
  4. Unlimited retention of personal data by third parties

Answer(s): C



A migration of personal data involving a data source with outdated documentation has been approved by senior management.
Which of the following should be done NEXT?

  1. Review data ow post migration.
  2. Ensure appropriate data classi cation.
  3. Engage an external auditor to review the source data.
  4. Check the documentation version history for anomalies.

Answer(s): A



Page 29 of 56



Post your Comments and Discuss ISACA CDPSE exam with other Community members:

noni commented on November 23, 2023
looking forward to it
Anonymous
upvote