Free CDPSE Exam Braindumps (page: 6)

Page 6 of 56

Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?

  1. End users using weak passwords
  2. Organizations using weak encryption to transmit data
  3. Vulnerabilities existing in authentication pages
  4. End users forgetting their passwords

Answer(s): A



Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?

  1. Implement a data loss prevention (DLP) system.
  2. Use only the data required by the application.
  3. Encrypt all data used by the application.
  4. Capture the application's authentication logs.

Answer(s): B



An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities.
Which data protection principle is applied?

  1. Data integrity and con dentiality
  2. System use requirements
  3. Data use limitation
  4. Lawfulness and fairness

Answer(s): A



What type of personal information can be collected by a mobile application without consent?

  1. Full name
  2. Geolocation
  3. Phone number
  4. Accelerometer data

Answer(s): A



Page 6 of 56



Post your Comments and Discuss ISACA CDPSE exam with other Community members:

noni commented on November 23, 2023
looking forward to it
Anonymous
upvote