ISACA CDPSE Certified Data Privacy Solutions Engineer Online Training
ISACA CDPSE Online Training
The questions for CDPSE were last updated at Apr 23,2025.
- Exam Code: CDPSE
- Exam Name: Certified Data Privacy Solutions Engineer
- Certification Provider: ISACA
- Latest update: Apr 23,2025
Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?
- A . The organization lacks a hardware disposal policy.
- B . Emails are not consistently encrypted when sent internally.
- C . Privacy training is carried out by a service provider.
- D . The organization’s privacy policy has not been reviewed in over a year.
Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?
- A . Offline backup availability
- B . Recovery time objective (RTO)
- C . Recovery point objective (RPO)
- D . Online backup frequency
In which of the following should the data record retention period be defined and established?
- A . Data record model
- B . Data recovery procedures
- C . Data quality standard
- D . Data management plan
When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?
- A . Encoding
- B . Backup
- C . Encryption
- D . Classification
Which key stakeholder within an organization should be responsible for approving the outcomes of a privacy impact assessment (PIA)?
- A . Data custodian
- B . Privacy data analyst
- C . Data processor
- D . Data owner
Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?
- A . Limited functions and capabilities of a secured operating environment
- B . Monitored network activities for unauthorized use
- C . Improved data integrity and reduced effort for privacy audits
- D . Unlimited functionalities and highly secured applications
What is the BEST way for an organization to maintain the effectiveness of its privacy breach incident response plan?
- A . Require security management to validate data privacy security practices.
- B . Involve the privacy office in an organizational review of the incident response plan.
- C . Hire a third party to perform a review of data privacy processes.
- D . Conduct annual data privacy tabletop exercises.
Which of the following is MOST important when developing an organizational data privacy program?
- A . Obtaining approval from process owners
- B . Profiling current data use
- C . Following an established privacy framework
- D . Performing an inventory of all data
Which of the following should be considered personal information?
- A . Biometric records
- B . Company address
- C . University affiliation
- D . Age
Which of the following should an IT privacy practitioner do FIRST following a decision to expand
remote working capability to all employees due to a global pandemic?
- A . Evaluate the impact resulting from this change.
- B . Revisit the current remote working policies.
- C . Implement a virtual private network (VPN) tool.
- D . Enforce multi-factor authentication for remote access.