CDPSE Practice Questions
437 real CDPSE exam questions with expert-verified answers and explanations. Page 5 of 9.
- Question #201Privacy Governance
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
Privacy Impact Assessment (PIA)Cloud Data MigrationPrivacy Risk ManagementData Life Cycle Management - Question #202Data Life Cycle
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
AI privacyTraining dataData qualityBias prevention - Question #203Privacy Governance
To ensure effective management of an organization's data privacy policy, senior leadership MUST define:
Privacy GovernanceSenior Leadership RoleRoles and ResponsibilitiesAccountability - Question #204Data Life Cycle
Which of the following BEST ensures data confidentiality across databases?
Data ConfidentialityData AnonymizationPrivacy Enhancing TechniquesData De-identification - Question #205Privacy Architecture
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
Private key exposureData confidentialityVulnerability managementCryptography - Question #206Privacy Governance
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
Third-party managementChange managementBusiness impact analysisPrivacy risk - Question #207Privacy Architecture
Which of the following is considered a best practice with regard to event logging?
Event LoggingLog ManagementCentralized LoggingSecurity Best Practices - Question #208Privacy Governance
Which of the following statements is true about compliance risk?
Compliance riskRisk managementRisk measurementPrivacy program - Question #209Privacy Architecture
Which of the following would be classified as the first line of defense from the information security and privacy perspective?
Identification and AuthenticationAccess ControlSecurity ControlsFirst Line of Defense - Question #210Data Life Cycle
Which of the following BEST describes transformation rules used in data warehousing? Transformation rules are:
data warehousingdata transformationETLdata layers - Question #211Data Life Cycle
Which of the following should be used to address data kept beyond its intended lifespan?
Data minimizationData retentionPrivacy principles - Question #212Privacy Architecture
Which of the following would MOST effectively reduce the impact of a successful breach through a remote access solution?
Access ControlCompartmentalizationBreach Impact ReductionRemote Access Security - Question #213Privacy Governance
A multinational corporation is planning a big data initiative to help with critical business decisions. Which of the following is the BEST way to ensure personal data usage is stan...
Data standardizationData dictionaryPersonal data usageData governance - Question #214Data Life Cycle
An organization's data destruction guidelines should require hard drives containing personal data to go through which of the following processes prior to being crushed?
Data destructionHard drive sanitizationDegaussingData lifecycle management - Question #215Data Life Cycle
Which of the following processes BEST enables an organization to maintain the quality of personal data?
Data QualityData ValidationData AccuracyData Maintenance - Question #216Privacy Governance
Which of the following is the MOST important consideration when determining retention periods for personal data?
Data retentionPrivacy noticeTransparencyStorage limitation - Question #217Privacy Architecture
What is the BEST method to protect customers' personal data that is forwarded to a central system for analysis?
PseudonymizationData ProtectionData Analysis PrivacyPrivacy-Enhancing Technologies - Question #218Data Life Cycle
Which of the following should be done FIRST to address privacy risk when migrating customer relationship management (CRM) data to a new system?
Privacy Impact Assessment (PIA)Privacy Risk ManagementData MigrationData Life Cycle Management - Question #219Privacy Governance
Which of the following is the GREATEST obstacle to conducting a privacy impact assessment (PIA)?
PIAManagement Buy-inOrganizational ObstaclesPrivacy Program Management - Question #220Privacy Architecture
When configuring information systems for the communication and transport of personal data, an organization should:
System ConfigurationCompliance ReviewData in Transit PrivacyPrivacy Controls - Question #221Data Life Cycle
Which of the following helps define data retention time is a stream-fed data lake that includes personal data?
Data RetentionPrivacy Impact AssessmentPersonal DataData Lake - Question #222Data Life Cycle
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
Privacy regulationCloud data transferData sovereigntyBackup considerations - Question #223Data Life Cycle
Which of the following should be the FIRST consideration when selecting a data sanitization method?
Data sanitizationMedia disposalStorage typesData destruction - Question #224Privacy Architecture
Which of the following system architectures BEST supports anonymity for data transmission?
System ArchitectureAnonymityPeer-to-peerData Transmission - Question #225Privacy Governance
Of the following, who should be PRIMARILY accountable for creating an organization's privacy management strategy?
Chief Privacy Officer (CPO)Privacy Management StrategyOrganizational AccountabilityPrivacy Roles and Responsibilities - Question #226Privacy Governance
Which of the following is the BEST way to protect personal data in the custody of a third party?
Third-party riskVendor managementContractual obligationsData processing agreements - Question #227Privacy Governance
Which of the following is MOST important to ensure when developing a business case for the procurement of a new IT system that will process and store personal information?
Business CaseData Protection RequirementsPrivacy by DesignSystem Procurement - Question #228Privacy Governance
Which of the following is the BEST way to validate that privacy practices align to the published enterprise privacy management program?
Privacy Program ValidationPrivacy AuditingCompliance AssurancePrivacy Governance - Question #229Privacy Governance
Which of the following is the MOST critical action for an organization prior to tracking user activity in its applications?
Privacy NotificationTransparency PrinciplesUser Activity TrackingPrivacy Policy - Question #230Privacy Architecture
What should a sender do to send a recipient a file of personal data using asymmetric encryption?
Asymmetric EncryptionData ConfidentialityPublic-Key CryptographySecure Data Transmission - Question #231Data Life Cycle
A data subject's ability to securely obtain and reuse personal data for their own purposes across different services is known as the right to:
Data subject rightsData portabilityPersonal data reusePrivacy rights - Question #232Privacy Governance
Which of the following MUST be included in a contract with a vendor that will be processing personal data?
Vendor ContractsData Processing AgreementsBreach ReportingThird-Party Risk Management - Question #233Data Life Cycle
In addition to lowering costs and improving performance, which of the following is the MOST compelling reason to archive data?
Data ArchivingComplianceData RetentionLegal Requirements - Question #234Privacy Governance
The identification of all data recipients in a privacy notice to website visitors reflects which privacy principle?
Privacy PrinciplesInformed ConsentPrivacy NoticeData Recipients - Question #235Privacy Architecture
Which of the following is the BEST approach when providing data subjects with access to their personal data?
Data Subject AccessSelf-Service AccessUser InterfacePrivacy by Design - Question #236Privacy Governance
Information should only be considered personal information if it:
Personal InformationPIIData Definition - Question #237Privacy Governance
An organization decides to outsource its customer personal data analytics to a third party to understand spending habits. Which of the following is the MOST important contractual c...
Third-party riskVendor contractsData responsibilitiesOutsourcing privacy - Question #238Data Life Cycle
Which of the following is the BEST way to convert personal information to non-personal information?
PseudonymizationData De-identificationPrivacy Enhancing TechnologiesData Privacy Techniques - Question #239Privacy Architecture
What is the BEST method for protecting data transmissions to devices in the field?
Data Transmission SecurityHTTPSNetwork SecurityTLS - Question #240Privacy Architecture
A privacy impact assessment (PIA) is BEST performed by reviewing controls:
Privacy Impact Assessment (PIA)Controls ReviewTechnology StackPrivacy by Design - Question #241Privacy Governance
Which of the following should an IT privacy practitioner do FIRST when assessing the potential impact of new privacy legislation on the organization?
Privacy Impact AssessmentRegulatory ComplianceData MappingInitial Assessment Steps - Question #242Data Life Cycle
Which of the following approaches to incorporating privacy by design principles BEST ensures the privacy of personal information?
Privacy by DesignData Life Cycle ManagementPrivacy PrinciplesProactive Privacy - Question #243Privacy Architecture
To ensure security when accessing personal data from a corporate website, which of the following is a prerequisite to implementing Hypertext Transfer Protocol Secure (HTTPS)?
HTTPSTLSWeb SecurityNetwork Protocols - Question #244Privacy Architecture
Which of the following is the GREATEST privacy concern for an organization implementing endpoint detection response (EDR) tools on employee laptops?
EDR toolsTechnical privacy controlsSecurity effectivenessEmployee privacy - Question #245Privacy Governance
Which of the following is the MOST important topic to cover in privacy awareness training customized for an organization's IT security staff?
Privacy awareness trainingIT security staffIncident responseRoles and responsibilities - Question #246Privacy Architecture
Which of the following is the MOST effective method to obfuscate personal data in a public cloud environment?
TokenizationData obfuscationCloud privacyData protection techniques - Question #247Data Life Cycle
The BEST way to ensure the integrity of an organization's data is to log and review which of the following?
Data IntegrityData LoggingData MonitoringData Modification Tracking - Question #248Privacy Architecture
Which of the following controls BEST mitigates the risk of unauthorized access to personal information via brute force attacks through application programming interfaces (APIs)?
API SecurityAuthentication ControlsBrute Force MitigationPrivacy Controls - Question #249Privacy Governance
Which of the following BEST facilitates a privacy impact assessment (PIA)?
Privacy Impact Assessment (PIA)Privacy GovernanceBenchmarkingPolicy Management - Question #250Privacy Governance
Which of the following is MOST important to ensure when reviewing processes associated with the destruction of data?
Data destructionData ownerPrivacy governanceProcess review