ISACA CDPSE Certified Data Privacy Solutions Engineer Online Training
ISACA CDPSE Online Training
The questions for CDPSE were last updated at Feb 13,2025.
- Exam Code: CDPSE
- Exam Name: Certified Data Privacy Solutions Engineer
- Certification Provider: ISACA
- Latest update: Feb 13,2025
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
- A . Information security assessments
- B . Privacy impact assessments (PIAs)
- C . Data privacy standards
- D . Data lake configuration
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
- A . Data classification labeling
- B . Data residing in another country
- C . Volume of data stored
- D . Privacy training for backup users
Which of the following should be the FIRST consideration when selecting a data sanitization method?
- A . Risk tolerance
- B . Implementation cost
- C . Industry standards
- D . Storage type
Which of the following system architectures BEST supports anonymity for data transmission?
- A . Client-server
- B . Plug-in-based
- C . Front-end
- D . Peer-to-peer
Of the following, who should be PRIMARILY accountable for creating an organization’s privacy management strategy?
- A . Chief data officer (CDO)
- B . Privacy steering committee
- C . Information security steering committee
- D . Chief privacy officer (CPO)
Which of the following is the BEST way to protect personal data in the custody of a third party?
- A . Have corporate counsel monitor privacy compliance.
- B . Require the third party to provide periodic documentation of its privacy management program.
- C . Include requirements to comply with the organization’s privacy policies in the contract.
- D . Add privacy-related controls to the vendor audit plan.
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
- A . The system architecture is clearly defined.
- B . A risk assessment has been completed.
- C . Security controls are clearly defined.
- D . Data protection requirements are included.
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
- A . Conduct an audit.
- B . Report performance metrics.
- C . Perform a control self-assessment (CSA).
- D . Conduct a benchmarking analysis.
Which of the following is the GREATEST benefit of adopting data minimization practices?
- A . Storage and encryption costs are reduced.
- B . Data retention efficiency is enhanced.
- C . The associated threat surface is reduced.
- D . Compliance requirements are met.
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider.
What should be the FIRST step when developing an application link?
- A . Data tagging
- B . Data normalization
- C . Data mapping
- D . Data hashing