Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CDPSE Exam Dumps - Certified Data Privacy Solutions Engineer

Go to page:
Question # 25

An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption

keys?

A.

Ensure key management responsibility is assigned to the privacy officer.

B.

Ensure the keys are stored in a remote server.

C.

Ensure the keys are stored in a cryptographic vault.

D.

Ensure all access to the keys is under dual control_

Full Access
Question # 26

Which of the following is the BEST control to detect potential internal breaches of personal data?

A.

Data loss prevention (DLP) systems

B.

User behavior analytics tools

C.

Employee background Checks

D.

Classification of data

Full Access
Question # 27

Which of the following BEST supports an organization’s efforts to create and maintain desired privacy protection practices among employees?

A.

Skills training programs

B.

Awareness campaigns

C.

Performance evaluations

D.

Code of conduct principles

Full Access
Question # 28

To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.

A.

general counsel.

B.

database administrator.

C.

business application owner

D.

chief information officer (CIO)

Full Access
Question # 29

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

A.

Server details of the hosting environment

B.

Last logins of privileged users

C.

Last user who accessed personal data

D.

Application error events

Full Access
Question # 30

What type of personal information can be collected by a mobile application without consent?

A.

Full name

B.

Geolocation

C.

Phone number

D.

Accelerometer data

Full Access
Question # 31

In which of the following should the data record retention period be defined and established?

A.

Data record model

B.

Data recovery procedures

C.

Data quality standard

D.

Data management plan

Full Access
Question # 32

Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?

A.

De-identifying the data to be analyzed

B.

Verifying the data subjects have consented to the processing

C.

Defining the intended objectives

D.

Ensuring proper data sets are used to train the models

Full Access
Go to page: