Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CDPSE Exam Dumps - Certified Data Privacy Solutions Engineer

Go to page:
Question # 17

Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?

A.

Offline backup availability

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Online backup frequency

Full Access
Question # 18

When tokenizing credit card data, what security practice should be employed with the original data before it is stored in a data lake?

A.

Encoding

B.

Backup

C.

Encryption

D.

Classification

Full Access
Question # 19

Which of the following MUST be available to facilitate a robust data breach management response?

A.

Lessons learned from prior data breach responses

B.

Best practices to obfuscate data for processing and storage

C.

An inventory of previously impacted individuals

D.

An inventory of affected individuals and systems

Full Access
Question # 20

Which of the following is the GREATEST concern for an organization subject to cross-border data transfer regulations when using a cloud service provider to store and process data?

A.

The service provider has denied the organization’s request for right to audit.

B.

Personal data stored on the cloud has not been anonymized.

C.

The extent of the service provider’s access to data has not been established.

D.

The data is stored in a region with different data protection requirements.

Full Access
Question # 21

Which of the following BEST enables an organization to ensure consumer credit card numbers are accurately captured?

A.

Input reference controls

B.

Access controls

C.

Input validation controls

D.

Reconciliation controls

Full Access
Question # 22

Which of the following is a role PRIMARILY assigned to an internal data owner?

A.

Monitoring data retention periods

B.

Authorizing access rights

C.

Serving as primary contact with regulators

D.

Implementing appropriate technical controls

Full Access
Question # 23

Which of the following should be the FIRST consideration when selecting a data sanitization method?

A.

Risk tolerance

B.

Implementation cost

C.

Industry standards

D.

Storage type

Full Access
Question # 24

Which of the following helps to ensure the identities of individuals in two-way communication are verified?

A.

Virtual private network (VPN)

B.

Transport Layer Security (TLS)

C.

Mutual certificate authentication

D.

Secure Shell (SSH)

Full Access
Go to page: