Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CDPSE Practice Exam with Questions & Answers | Set: 4

Questions 31

Which of the following is the BEST indication of a highly effective privacy training program?

Options:
A.

Members of the workforce understand their roles in protecting data privacy

B.

Recent audits have no findings or recommendations related to data privacy

C.

No privacy incidents have been reported in the last year

D.

HR has made privacy training an annual mandate for the organization_

Isaca CDPSE Premium Access
Questions 32

Using hash values With stored personal data BEST enables an organization to

Options:
A.

protect against unauthorized access.

B.

detect changes to the data.

C.

ensure data indexing performance.

D.

tag the data with classification information

Questions 33

Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?

Options:
A.

Require an annual internal audit of SDLC processes.

B.

Include qualified application security personnel as part of the process.

C.

Ensure comprehensive application security testing immediately prior to release.

D.

Require an annual third-party audit of new client software solutions.

Questions 34

Which of the following is the BEST method to ensure the security of encryption keys when transferring data containing personal information between cloud applications?

Options:
A.

Whole disk encryption

B.

Asymmetric encryption

C.

Digital signature

D.

Symmetric encryption

Questions 35

An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities. Which data protection principle is applied?

Options:
A.

Data integrity and confidentiality

B.

System use requirements

C.

Data use limitation

D.

Lawfulness and fairness

Questions 36

Critical data elements should be mapped to which of the following?

Options:
A.

Data process flow

B.

Business analytics

C.

Business taxonomy

D.

Privacy policy

Questions 37

Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?

Options:
A.

The data is encrypted and a key is required to re-identify the data.

B.

Key fields are hidden and unmasking is required to access to the data.

C.

Names and addresses are removed but the rest of the data is left untouched.

D.

The data is transformed such that re-identification is impossible.

Questions 38

Which of the following has the GREATEST impact on the treatment of data within the scope of an organization's privacy policy?

Options:
A.

Data protection impact assessment (DPIA)

B.

Data flow diagram

C.

Data classification

D.

Data processing agreement

Questions 39

When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?

Options:
A.

Co-regulatory

B.

Sectoral

C.

Comprehensive

D.

Self-regulatory

Questions 40

Which of the following should an IT privacy practitioner review FIRST to understand where personal data is coming from and how it is used within the organization?

Options:
A.

Data process flow diagrams

B.

Data inventory

C.

Data classification

D.

Data collection standards

Exam Code: CDPSE
Certification Provider: Isaca
Exam Name: Certified Data Privacy Solutions Engineer
Last Update: Jul 17, 2025
Questions: 218

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.