CDPSE Practice Questions
437 real CDPSE exam questions with expert-verified answers and explanations. Page 9 of 9.
- Question #401Privacy Governance
The purpose of consent tagging is to:
Consent managementConsent taggingPrivacy preferencesData subject rights - Question #402Data Life Cycle
Which of the following poses the GREATEST data privacy risk related to the use of large language models (LLMs)?
LLM privacy risksPersonal data processingModel training dataData lifecycle privacy - Question #403Privacy Architecture
Which of the following is considered a privacy-enhancing technology (PET)?
Privacy-enhancing technologiesSynthetic dataData minimizationAI and privacy - Question #404Data Life Cycle
Which of the following would BEST support an organization in fulfilling data subject rights?
Data Subject RightsData MappingData InventoryPrivacy Operations - Question #405Privacy Governance
Which of the following is the MOST important consideration when introducing a privacy by design framework in an organization?
Privacy by DesignFramework ImplementationBusiness AlignmentOrganizational Strategy - Question #406Privacy Governance
Which of the following is the MOST important reason for an organization to establish a framework for privacy audits?
Privacy AuditsPrivacy Program EffectivenessCompliance AssuranceGovernance Framework - Question #407Privacy Architecture
Which of the following solutions would BEST enable a privacy practitioner to support control over data processing activities related to personal information?
Consent ManagementData Subject RightsPrivacy TechnologiesData Processing Control - Question #408Privacy Architecture
Which of the following observations should be of MOST concern to an IT privacy practitioner during an evaluation of an organization's privacy practices?
TokenizationData ProtectionPrivacy-Enhancing TechnologiesRisk Assessment - Question #409Privacy Architecture
Senior management is concerned about data privacy risk resulting from the current use of duplicative technologies. Which of the following is the BEST way to prevent this problem in...
Enterprise ArchitectureTechnology GovernancePrivacy Risk PreventionSystem Redundancy - Question #410Privacy Governance
Which of the following metrics would BEST demonstrate how privacy compliance can be achieved throughout the supply chain?
Privacy MetricsSupply Chain PrivacyThird-Party Risk ManagementPrivacy Audits - Question #411Privacy Architecture
A privacy practitioner has recommended new techniques that add noise to the output of an AI model in order to protect data privacy. Which of the following techniques is the practit...
Differential privacyAI privacyPrivacy-enhancing technologiesData anonymization - Question #412Privacy Governance
Which of the following metrics is BEST to use for assessing the effectiveness of a privacy training program?
Privacy trainingProgram effectivenessMetricsPerformance measurement - Question #413Privacy Architecture
Which of the following is the BEST way to minimize privacy risk in AI applications?
AI PrivacyFederated LearningPrivacy Enhancing Technologies - Question #414Privacy Architecture
Which of the following is the PRIMARY reason to establish maximum idle virtual private network (VPN) times?
VPN securitySession managementAccess controlData protection - Question #415Data Life Cycle
Which of the following is the MOST secure method for receiving personal data from potential customers via a web form?
Secure CommunicationWeb SecurityData CollectionHTTPS - Question #416Privacy Architecture
Which of the following is a PRIMARY privacy advantage of a comprehensive asset management program?
Asset ManagementData ProtectionRemote WipePrivacy Controls - Question #417Privacy Governance
Which of the following is the PRIMARY purpose of a privacy framework?
Privacy FrameworksAccountabilityTransparencyPrivacy Principles - Question #418Privacy Governance
When addressing privacy risks identified during a risk assessment, which of the following is MOST important for ensuring the risk treatment plan is effective?
Risk Treatment PlanAccountabilityPrivacy GovernanceRisk Management - Question #419Privacy Architecture
Which of the following BEST mitigates the risk associated with credential-based attacks?
Multi-factor authentication (MFA)Credential-based attacksRisk mitigationAccess control - Question #420Privacy Governance
Which of the following is the MOST important privacy consideration to include in a policy on AI usage?
AI PrivacyTransparencyPrivacy PolicyUser Awareness - Question #421Privacy Architecture
Which of the following MOST effectively prevents unauthorized parties from logging into a remote access solution by using stolen credentials?
Multi-Factor Authentication (MFA)Access ControlRemote Access SecurityAuthentication - Question #422Privacy Architecture
Which of the following actions can MOST effectively ensure compliance with user preferences when processing personal data?
Consent managementUser preferencesPrivacy controlsCompliance mechanisms - Question #423Privacy Architecture
Which of the following technologies has the potential to enhance consent tagging by providing a transparent and immutable record of consent transactions?
BlockchainConsent ManagementImmutable RecordsPrivacy Enhancing Technologies - Question #424Data Life Cycle
Which of the following should be performed during the final phase of the data life cycle?
Data life cycleData disposalFinal phase - Question #425Privacy Architecture
Which of the following controls is MOST effective at mitigating data privacy risks associated with lost or stolen IT assets?
Data ProtectionEncryptionAsset SecurityData at Rest - Question #426Privacy Architecture
Which of the following is MOST important for an organization to review when evaluating privacy- enhancing technologies (PETs)?
Privacy-enhancing technologies (PETs)Privacy risk managementTechnology evaluationRisk reduction - Question #427Privacy Architecture
Which of the following is the PRIMARY privacy advantage of an audit log?
Audit logsIncident detectionPrivacy monitoringSecurity controls - Question #428Privacy Governance
An investigation has been launched into the activity of an employee suspected of inappropriately accessing a private client database to view the financial records of an acquaintanc...
Logging and MonitoringIncident InvestigationData AccessEvidence Collection - Question #429Privacy Architecture
Which of the following BEST describes how data privacy is enhanced by federated learning?
Federated learningData privacyData localizationPrivacy-enhancing technologies - Question #430Privacy Governance
Which of the following BEST enables an organization to establish a comprehensive privacy risk management framework?
Privacy Risk Management FrameworkPrivacy GovernanceIndustry StandardsBest Practices - Question #431Data Life Cycle
Which of the following is the MOST important function of a solution that manages the consent of subjects browsing an organization's website, particularly concerning the handling of...
Consent ManagementData Subject RightsPersonal Data HandlingPrivacy Controls - Question #432Privacy Architecture
What is the BEST way for an organization to ensure privacy requirements are maintained in the event an external party gains unauthorized access to a database holding personal data?
Data ProtectionEncryptionData at RestDatabase Security - Question #433Data Life Cycle
Which of the following is MOST important to include in the consent statement of a membership application?
ConsentData SharingTransparencyData Subject Rights - Question #434Data Life Cycle
Which of the following is MOST important for employees to know when utilizing a public generative AI model?
Generative AIPersonal informationData handlingEmployee awareness - Question #435Privacy Architecture
Which of the following is the BEST way for an organization to address privacy concerns when deploying machine learning (ML) models?
Machine Learning privacyDifferential PrivacyPrivacy-enhancing technologies (PETs)Model training privacy - Question #436Privacy Architecture
An organization hosts data collected from its customers in the cloud and needs accurate data processing from its third parties without disclosing sensitive data. Which of the follo...
Privacy-enhancing technologies (PETs)Homomorphic encryptionCloud data processingThird-party data sharing - Question #437Privacy Architecture
Which of the following is the BEST method for data protection throughout the technology stack?
EncryptionData ProtectionPrivacy Enhancing TechnologiesSecurity Controls