CDPSE Certified Data Privacy Solutions Engineer Questions and Answers
Which of the following is the MOST important consideration for developing data retention requirements?
Which of the following is the MOST important attribute of a privacy policy?
Breach notification period
Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?
Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?
Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?
Which of the following is MOST important to consider when managing changes to the provision of services by a third party that processes personal data?
A technology company has just launched a mobile application tor tracking health symptoms_ This application is built on a mobile device technology stack that allows
users to share their location and details of their symptoms. Which of the following is the GREATEST privacy concern with collecting this data via mobile devices?
Which of the following is the BEST indication of a highly effective privacy training program?
Which of the following is the BEST course of action to prevent false positives from data loss prevention (DLP) tools?
Which of the following privacy-enhancing technologies (PETs) is MOST effective for ensuring individual data records cannot be linked back to specific individuals in a dataset?
Which of the following BEST ensures an effective data privacy policy is implemented?
Which of the following BEST enables an organization to ensure privacy-related risk responses meet organizational objectives?
An organization is developing a wellness smartwatch application and is considering what information should be collected from the application users. Which of the following is the MOST legitimate information to collect for business reasons in this situation?
Which of the following is the BEST method of data sanitization when there is a need to balance the destruction of data and the ability to recycle IT assets?
Which of the following tracking technologies associated with unsolicited targeted advertisements presents the GREATEST privacy risk?
When capturing browsing and purchase data from consumers visiting a corporate website more than once, which of the following metadata-based technologies is typically used to identify a consumer?
Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?
An organization must de-identify its data before it is transferred to a third party Which of the following should be done FIRST?
When is the BEST time during the secure development life cycle to perform privacy threat modeling?
Which of the following is the BEST way for senior management to verify the success of its commitment to privacy by design?
Which of the following BEST ensures an organization's data retention requirements will be met in the public cloud environment?
Which of the following should be done NEXT after a privacy risk has been accepted?
Which of the following is the MOST important consideration when introducing a privacy by design framework in an organization?
Which of the following is a PRIMARY consideration to protect against privacy violations when utilizing artificial intelligence (AI) driven business decisions?
Which type of data is produced by using a more complex method of analytics to find correlations between data sets and using them to categorize or profile people?
Which of the following vulnerabilities would have the GREATEST impact on the privacy of information?
An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner’s BEST recommendation?
Which of the following solutions would BEST enable a privacy practitioner to support control over data processing activities related to personal information?
When using pseudonymization to prevent unauthorized access to personal data, which of the following is the MOST important consideration to ensure the data is adequately protected?
When configuring information systems for the communication and transport of personal data, an organization should:
When a government’s health division established the complete privacy regulation for only the health market, which privacy protection reference model is being used?
Which of the following is the BEST way for an organization to gain visibility into Its exposure to privacy-related vulnerabilities?
An organization want to develop an application programming interface (API) to seamlessly exchange personal data with an application hosted by a third-party service provider. What should be the FIRST step when developing an application link?
Which of the following is the BEST way to ensure an organization's enterprise risk management (ERM) framework can protect the organization from privacy harms?
Which of the following should an IT privacy practitioner review FIRST to understand where personal data is coming from and how it is used within the organization?
Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?
Which of the following is the MOST effective use of data flow diagrams when implementing a data privacy compliance program?
Which of the following is the BEST control to secure application programming interfaces (APIs) that may contain personal information?
Which of the following is the MOST effective way to support organizational privacy awareness objectives?
What is the BEST method to protect customers’ personal data that is forwarded to a central system for analysis?
Which of the following poses the GREATEST privacy risk for client-side application processing?
Which of the following scenarios poses the GREATEST risk to an organization from a privacy perspective?
Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?
Which of the following outputs of a privacy audit is MOST likely to trigger remedial action?
Which of the following processes BEST enables an organization to maintain the quality of personal data?
Which encryption method encrypts and decrypts data using two separate yet mathematically connected cryptographic keys?
In which of the following should the data record retention period be defined and established?
An IT privacy practitioner wants to test an application in pre-production that will be processing sensitive personal data. Which of the following testing methods is
BEST used to identity and review the application's runtime modules?
Which of the following approaches to incorporating privacy by design principles BEST ensures the privacy of personal information?
Which of the following should an IT privacy practitioner do FIRST following a decision to expand remote working capability to all employees due to a global pandemic?
When evaluating cloud-based services for backup, which of the following is MOST important to consider from a privacy regulation standpoint?
A data processor that handles personal data tor multiple customers has decided to migrate its data warehouse to a third-party provider. What is the processor
obligated to do prior to implementation?
To ensure the protection of personal data, privacy policies should mandate that access to information system applications be authorized by the.
Which of the following practices BEST indicates an organization follows the data minimization principle?
Which of the following is the BEST way to protect the privacy of data stored on a laptop in case of loss or theft?
Which of the following helps to ensure the identities of individuals in a two-way communication are verified?
Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?
Which of the following is MOST likely to present a valid use case for keeping a customer’s personal data after contract termination?
An organization is creating a personal data processing register to document actions taken with personal data. Which of the following categories should document controls relating to periods of retention for personal data?
Which of the following is the PRIMARY reason that a single cryptographic key should be used for only one purpose, such as encryption or authentication?
Which of the following technologies BEST facilitates protection of personal data?
Before executive leadership approves a new data privacy policy, it is MOST important to ensure:
Which of the following is MOST important to establish within a data storage policy to protect data privacy?
Which of the following features should be incorporated into an organization’s technology stack to meet privacy requirements related to the rights of data subjects to control their personal data?
Which of the following can BEST help an organization ensure that it maintains accurate and up-to-date data inventory records?