Massive New Year Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CDPSE Questions and Answers

Question # 4

Which of the following is the MOST important consideration when using advanced data sanitization methods to ensure privacy data will be unrecoverable?

A.

Subject matter expertise

B.

Type of media

C.

Regulatory compliance requirements

D.

Location of data

Full Access
Question # 5

Within a business continuity plan (BCP), which of the following is the MOST important consideration to ensure the ability to restore availability and access to personal data in the event of a data privacy incident?

A.

Offline backup availability

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Online backup frequency

Full Access
Question # 6

Which of the following is the BEST way to distinguish between a privacy risk and compliance risk?

A.

Perform a privacy risk audit.

B.

Conduct a privacy risk assessment.

C.

Validate a privacy risk attestation.

D.

Conduct a privacy risk remediation exercise.

Full Access
Question # 7

Which of the following is an IT privacy practitioner’s BEST recommendation to reduce privacy risk before an organization provides personal data to a third party?

A.

Tokenization

B.

Aggregation

C.

Anonymization

D.

Encryption

Full Access
Question # 8

Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?

A.

For the purpose of medical research

B.

A forthcoming campaign to win back customers

C.

A required retention period due to regulations

D.

Ease of onboarding when the customer returns

Full Access
Question # 9

Before executive leadership approves a new data privacy policy, it is MOST important to ensure:

A.

a training program is developed.

B.

a privacy committee is established.

C.

a distribution methodology is identified.

D.

a legal review is conducted.

Full Access
Question # 10

Which of the following is the GREATEST benefit of adopting data minimization practices?

A.

Storage and encryption costs are reduced.

B.

Data retention efficiency is enhanced.

C.

The associated threat surface is reduced.

D.

Compliance requirements are met.

Full Access
Question # 11

Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?

A.

Compartmentalizing resource access

B.

Regular testing of system backups

C.

Monitoring and reviewing remote access logs

D.

Regular physical and remote testing of the incident response plan

Full Access
Question # 12

Which of the following is the MOST important consideration when determining retention periods for personal data?

A.

Sectoral best practices for the industry

B.

Notice provided to customers during data collection

C.

Data classification standards

D.

Storage capacity available for retained data

Full Access
Question # 13

Which of the following is the MOST important consideration when writing an organization’s privacy policy?

A.

Using a standardized business taxonomy

B.

Aligning statements to organizational practices

C.

Ensuring acknowledgment by the organization’s employees

D.

Including a development plan for personal data handling

Full Access
Question # 14

When configuring information systems for the communication and transport of personal data, an organization should:

A.

adopt the default vendor specifications.

B.

review configuration settings for compliance.

C.

implement the least restrictive mode.

D.

enable essential capabilities only.

Full Access
Question # 15

Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?

A.

Develop a data migration plan.

B.

Conduct a legitimate interest analysis (LIA).

C.

Perform a privacy impact assessment (PIA).

D.

Obtain consent from data subjects.

Full Access
Question # 16

Which of the following is the BEST indication of an effective records management program for personal data?

A.

Archived data is used for future analytics.

B.

The legal department has approved the retention policy.

C.

All sensitive data has been tagged.

D.

A retention schedule is in place.

Full Access
Question # 17

Which of the following is the PRIMARY consideration to ensure control of remote access is aligned to the privacy policy?

A.

Access is logged on the virtual private network (VPN).

B.

Multi-factor authentication is enabled.

C.

Active remote access is monitored.

D.

Access is only granted to authorized users.

Full Access
Question # 18

Which of the following is MOST important when designing application programming interfaces (APIs) that enable mobile device applications to access personal data?

A.

The user’s ability to select, filter, and transform data before it is shared

B.

Umbrella consent for multiple applications by the same developer

C.

User consent to share personal data

D.

Unlimited retention of personal data by third parties

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 23 Jan 2022