Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Complete CDPSE Isaca Materials

Page: 9 / 19
Total 247 questions

Certified Data Privacy Solutions Engineer Questions and Answers

Question 33

Which of the following BEST represents privacy threat modeling methodology?

Options:

A.

Mitigating inherent risks and threats associated with privacy control weaknesses

B.

Systematically eliciting and mitigating privacy threats in a software architecture

C.

Reliably estimating a threat actor’s ability to exploit privacy vulnerabilities

D.

Replicating privacy scenarios that reflect representative software usage

Question 34

Which of the following should FIRST be established before a privacy office starts to develop a data protection and privacy awareness campaign?

Options:

A.

Detailed documentation of data privacy processes

B.

Strategic goals of the organization

C.

Contract requirements for independent oversight

D.

Business objectives of senior leaders

Question 35

Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?

Options:

A.

Focus on developing a risk action plan based on audit reports.

B.

Focus on requirements with the highest organizational impact.

C.

Focus on global compliance before meeting local requirements.

D.

Focus on local standards before meeting global compliance.

Question 36

Which of the following is the MOST effective remote access model for reducing the likelihood of attacks originating from connecting devices?

Options:

A.

Thick client desktop with virtual private network (VPN) connection

B.

Remote wide area network (WAN) links

C.

Thin Client remote desktop protocol (RDP)

D.

Site-to-site virtual private network (VPN)

Page: 9 / 19
Total 247 questions