ISACA CDPSE Certified Data Privacy Solutions Engineer Online Training
ISACA CDPSE Online Training
The questions for CDPSE were last updated at Apr 07,2025.
- Exam Code: CDPSE
- Exam Name: Certified Data Privacy Solutions Engineer
- Certification Provider: ISACA
- Latest update: Apr 07,2025
Which of the following vulnerabilities is MOST effectively mitigated by enforcing multi-factor authentication to obtain access to personal information?
- A . End users using weak passwords
- B . Organizations using weak encryption to transmit data
- C . Vulnerabilities existing in authentication pages
- D . End users forgetting their passwords
Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?
- A . Implement a data loss prevention (DLP) system.
- B . Use only the data required by the application.
- C . Encrypt all data used by the application.
- D . Capture the application’s authentication logs.
An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities.
Which data protection principle is applied?
- A . Data integrity and confidentiality
- B . System use requirements
- C . Data use limitation
- D . Lawfulness and fairness
What type of personal information can be collected by a mobile application without consent?
- A . Full name
- B . Geolocation
- C . Phone number
- D . Accelerometer data
What is the PRIMARY means by which an organization communicates customer rights as it relates to the use of their personal information?
- A . Distributing a privacy rights policy
- B . Mailing rights documentation to customers
- C . Publishing a privacy notice
- D . Gaining consent when information is collected
A new marketing application needs to use data from the organization’s customer database.
Prior to the application using the data, which of the following should be done FIRST?
- A . Ensure the data loss prevention (DLP) tool is logging activity.
- B . De-identify all personal data in the database.
- C . Determine what data is required by the application.
- D . Renew the encryption key to include the application.
Which of the following MUST be available to facilitate a robust data breach management response?
- A . Lessons learned from prior data breach responses
- B . Best practices to obfuscate data for processing and storage
- C . An inventory of previously impacted individuals
- D . An inventory of affected individuals and systems
Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
- A . Trusted zone
- B . Clean zone
- C . Raw zone
- D . Temporal zone
Which of the following poses the GREATEST privacy risk for client-side application processing?
- A . Failure of a firewall protecting the company network
- B . An employee loading personal information on a company laptop
- C . A remote employee placing communication software on a company server
- D . A distributed denial of service attack (DDoS) on the company network
Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?
- A . Access is logged on the virtual private network (VPN).
- B . Multi-factor authentication is enabled.
- C . Active remote access is monitored.
- D . Access is only granted to authorized users.