Sunday, December 10, 2023

ISACA CDPSE EXAM PRACTICE - 170 QUESTIONS AND ANSWER

CDPSE EXAM PRACTICE - 170 QUESTIONS AND ANSWER

BY MR. HERY PURNAMA SE., MM.
CISA, CISM, CRISC, CDPSE, CISSP, PMP, CDMP CTFL, COBIT, TOGAF, CTFL



CDPSE EXAM PRACTICE QUESTIONS AND ANSWER (170 QUESTIONS)


1. In the United States, which of the following best describes a subject’s own PII elements that the subject is required to protect?

      All PII as described by the US Data Protection Act

      Social Security number, bank account numbers, credit card numbers

      Bank account numbers, credit card numbers

      None


2. At which point in the SDLC should a PIA be performed?

      Before requirements are developed

      After requirements are developed

      After implementation

      Before QA testing


3. For reasons unknown, an organization’s executive management refuses to deliberate or make a decision regarding a particular privacy risk that the chief privacy officer has identified. What risk treatment is being carried out in this situation?

      Risk ignorance

      Risk transfer

      Risk avoidance

      Risk acceptance


4. A data architect is developing a visual model that shows how information is transmitted among systems. What kind of a visual model has the data architect created?

      Data flow diagram

      Data architecture

      Entity-relationship diagram

      Network diagram


5. Which of the following methods is used to develop a machine-readable web services definition?

      Schema

      WWWC

      WSDL

      APID


6. A typical VPN solution will protect endpoints from which of the following threats?

      Buffer overflow

      Credential stuffing

      Ping of death

      Network eavesdropping


7. An organization has been donating EOL laptop computers to local schools for years. In the past, the organization would degauss laptop HDDs to remove sensitive information. Now that laptops contain SSDs instead of HDDs, which of the following methods remains effective for removing sensitive data?

      Secure erasure

      Degaussing

      SSD removal

      Reformatting


8. Infrastructure as a service refers to:

      Leasing operating systems from a service provider

      Outsourcing application management to a service provider

      Outsourcing operating system management to a service provider

      Leasing computing hardware for use in a colocation facility


9. A cybercriminal group stole PII from a telephone company’s customer database and used the information obtained to open unsecured credit accounts in the names of the telephone company customers. What crime(s) has the cybercriminal group committed?

      Toll fraud

      Data theft

      Data theft and identity theft

      Identity theft


10. Which of the following is the best SLA for deploying critical security patches in a production environment that processes personal information?

      30 days

      24 hours

      7 hours

      7 days


11. What is the main purpose of a data classification program?

      Determine how long the most sensitive data has been stored.

      Discover where the most sensitive data is being stored.

      Enable automatic tagging of sensitive information.

      Enable the workforce to recognize and protect data accordingly.


12. An organization defines the roles “owner” and “steward” with regard to decisions about its databases containing personal information. Which of the following is NOT an appropriate responsibility for the role of owner?

      Review of access roles

      Physical database design

      Approval of access requests

      Logical database design


13. Which of the following personnel is responsible for the accuracy of customer PII in an organization’s database?

      Business unit leader

      Database administrator

      Chief privacy officer

      Application developer


14. A data privacy officer in a financial services organization is developing a data classification policy. What audience in the organization should be informed of the new policy once it is completed?

      All workers

      Database administrators

      Customer-facing workers

      IT workers


15. A document that describes steps to be performed within a privacy program is known as a:

      Charter

      Procedure

      Process

      Privacy policy


16. Despite statements to the contrary in its external privacy statement, an organization intends to sell its customer list to a data brokerage. Which principle of privacy is likely to be violated if this transaction is completed?

      Data use limitation

      Data leakage

      Data sovereignty

      Data minimization


17. All of the following are important considerations in an application data migration EXCEPT:

      Availability of sufficient storage space on the destination system

      Proper transformation of data values when they are expressed in different ways

      Understanding any differences in meaning between similar source and destination fields

      Understanding any differences in the DML between the source and destination systems


18. A service provider that stores and processes sensitive information for corporate customers employs an annual SOC 2 Type 2 audit. What additional information is needed so that recipients of the SOC 2 audit reports understand whether privacy is addressed during the audit?

      Whether the SOC 2 audit includes the Privacy principle

      Whether the SOC 2 audit report is up-to-date

      Whether exceptions were encountered during the audit

      Whether the recipient has permission to read the SOC 2 audit report


19. An organization has a transaction processing application that contains a very large database with a low transaction rate. Which of the following is the best option for providing the ability to recover the database to an earlier point in time?

      Export to flat file

      Backup to magnetic tape

      Snapshots

      Checksums


20. An online and storefront retail organization has an extensive transaction history spanning many years that shows all of the purchases that customers have made. Potential uses of this transaction data include all of the following EXCEPT:

      Machine learning to identify privacy violations

      Data analytics to improve inventory management

      Data analytics techniques to monetize the data and increase future sales

      AI techniques to set more competitive prices


21. What is the relationship between security and privacy requirements and an application’s test plan?

      Each requirement should be verified through testing.

      There is no relationship; each is independent of the other.

      Only requirements that can be tested via automation should be tested.

      High risk requirements should be included in the test plan.


22. The purpose of an internal privacy policy is:

      To define expected behavior regarding the protection and use of personal information

      To inform regulators about their privacy rights and remedies

      To establish a position of compliance with applicable privacy laws

      To inform customers and constituents about their privacy rights and remedies


23. Which of the following techniques is NOT effective at destroying data on an SSD?

      Shredding

      Burning

      Drilling

      Degaussing


24. In violation of its own privacy policy, an organization is selling customer data to other companies to increase revenue. This violates what privacy principle?

      Data minimization

      Consent

      Basis for processing

      Data use limitation


25. The chief characteristic of PII and natural persons is:

      PII enables information to be associated with specific natural persons

      Natural persons are able to update their PII.

      Natural persons are able to delete their PII.

      Privacy laws enable organizations to store PII.


26. What is the main difference between a data warehouse and a data lake?

      A data lake is a structured data store; a data warehouse consists of data stores in their native formats.

      A data warehouse is a structured data store; the content of a data lake consists of data stores in their native formats.

      A data lake is a collection of data warehouses.

      A data warehouse is a collection of data lakes.


27. What is the purpose of a visible data classification indicator on a document?

      Indicates the document has been properly handled

      Reminds personnel of the document’s classification level

      Is readable by automated data loss prevention tools

      Indicates the document has been inventoried


28. LAMP is the common acronym related to:

      Linux, Apache, MySQL, and PHP

      Least access management practice

      Linux, Atlassian, MySQL, and Python

      Red Hat, Apache, MySQL, and Python


29. An auditor is preparing an audit plan of an organization’s data subject request (DSR) process. From which set of information should the population of DSRs be selected?

      The record of incoming requests

      The DSR metrics

      The database containing stored requests

      The record of completed requests


30. The most common and consistent message imparted in privacy training and awareness programs is:

      The IT security department is responsible for the protection of personal information.

      All workers are responsible for the protection of personal information.

      The IT department is responsible for the protection of personal information.

      The privacy department is responsible for the protection of personal information.


31. Which of the following privacy laws requires a “Do Not Sell My Personal Information” feature on an organization’s web site?

      General Data Protection Regulation

      California Confidential Privacy Act

      Personal Information Protection and Electronic Documents Act

      California Consumer Privacy Act


32. What is the best approach for an organization to define PII?

      Identify applicable privacy laws and their definitions of PII.

      Use the definition from Article 5 of the GDPR.

      Use the definition from Article 4 of the GDPR.

      Use guidelines from ISO 27001/27002.


33. An organization is updating its data retention schedule to include electronic records. What differences in retention between paper records and electronic records should be established?

      Each circumstance is different and must be decided case by case.

      Electronic records should be retained for one year longer than paper records.

      No differences should be made in retention between electronic and paper records.

      Paper records should be retained for one year longer than electronic records.


34. The act of making a decision to accept or mitigate a risk is known as:

      Risk treatment

      Risk management

      Risk mitigation

      Risk reductiıon


35. What is the purpose of input field sanitization in a web application?

      Protect endpoint from exploitation.

      Block input field attacks.

      Perform range checking on input data.

      Perform type checking on input data.


36. In most industries, which of the following is considered an adequate level of paper document destruction?

      Pulping

      Placement in secure disposal bins

      Strip-cut shredding

      Cross-cut shredding


37. A data architect wants to create some diagrams that will visually depict the structure of data in a database. What kind of a diagram should the data architect produce?

      Warnier-Orr diagram

      Database schema

      Data flow diagram

      Entity-relationship diagram


38. Data analysts in an organization are struggling with the creation of business rules regarding employee data that resides on several different systems with no central authority. What should data analysts strive to do in this situation?

      Select one of the systems as the system of record.

      Implement data tagging to trace the flow of data.

      Build a data flow diagram to depict data flows.

      Build an entity-relationship diagram to depict schemas.


39. A program designed to make decisions and be aware of the results of those decisions for further improvement employs:

      Recursive learning

      Feedback loops

      Artificial intelligence

      Machine learning


40. In a private organization, which workers are typically held responsible for the protection of personal information?

      IT security

      IT department

      All workers

      Privacy department


41. A risk manager has created a spreadsheet that contains a list of security- and privacy-related concerns, along with potential remedies. What is the formal name for this spreadsheet?

      Risk register

      Privacy wish list

      Risk analysis

      Risk assessment


42. As a way of shifting costs away from capital spending, an organization is devising a “lift-and-shift” strategy whereby it will be leasing virtual machines from a cloud provider and discontinuing use of its own server hardware. What type of a cloud service is being considered?

      PaaS

      IaaS

      VaaS

      SaaS


43. What privacy- or security-related disadvantage is introduced through the offering of a choice of IDEs in an organization?

      Undetected intrusion into developer’s workstation

      Inconsistent compilation

      Greater risk of ransomware attack

      Security inconsistencies in source code and a potential lack of key security features


44. An organization is considering changing the configuration of its laptop computers to require VPN every time they are used to connect to non-company networks. Which of the following use cases is likely to be problematic?

      Gigabit broadband that is faster than the corporate Internet connection

      Employee using in-flight network

      Employee using home network with firewalls

      Employee working offline with no connectivity


45. The Do Not Track feature in most web browsers:

      Is a feature present in virtually all browsers

      Is used voluntarily by organizations

      Legally enforces privacy laws

      Legally requires that organizations not track visitors


46. Which of the following best describes a data lake?

      A storage system containing structured and unstructured data

      An integrated database containing data from multiple sources

      A collection of native format files, both structured and unstructured

      A data specification representing the merge of multiple schemas


47. Which of the following terms correctly refers to the practice of implementing multiple isolated application instances in an operating system?

      Virtualization

      Containerization

      Bare metal computing

      Process isolation


48. The new privacy officer in an organization wants to be involved earlier in the development of new business offerings and services. The privacy officer wants to understand the implications on customer privacy for these new activities. What specific activity is the privacy officer advocating?

      Privacy impact assessment

      Qualitative risk assessment

      Business process change management

      Risk assessment


49. An organization’s marketing team wants to combine it customer data from various sources to create a database with additional PII for each customer in one place. This process is known as:

      Building a data lake

      Concatenation

      Aggregation

      Embellishment


50. To be included in an organization’s marketing campaigns, the basic nature of consent as defined by the GDPR is:

      Persons are automatically opted in.

      Persons can never be opted in.

      Persons are automatically opted out after one year.

      Persons must explicitly opt in.


51. What is usually the primary objective of risk management?

      A. Fewer and less severe privacy and security incidents


      B. No privacy or security incidents


      C. Improved compliance


      D. Fewer audit findings


52. An organization is contemplating significant changes to a business process that involves the management of personal information. When should a PIA be performed?

      A. After requirements have been developed


      B. Before requirements have been developed


      C. After the process has been changed


      D. After the process design changes have been completed


53. As a part of a privacy impact assessment (PIA), a security manager

has completed a vulnerability scan and has identified numerous

vulnerabilities in production servers that could result in the exposure

of personal information. What is the best course of action?

      A. Recommend that vulnerabilities be remediated.


      B. Notify regulators.


      C. Notify system owners.


      D. Add individual vulnerability entries to the risk register.


54. A security manager is performing a risk assessment on a business application. The security manager has determined that security patches have not been installed for more than a year. This finding is known as a:

      A. Probability


      B. Threat


      C. Vulnerability


      D. Risk


55. Program responsibilities over the activities of managing data subject requests lie with:

      A. Customer support


      B. The chief marketing officer


      C. The chief information security officer


      D. The chief privacy officer


56. A privacy manager is advocating the use of VDI for a call center. What is the primary privacy benefit of using VDI?

      A. Reduces impact of malware


      B. Prevents local programs from being installed


      C. Reduces likelihood of data leakage


      D. Logs all transactions


57. A privacy officer wants to restrict the direct database queries that analysts can run, so that they can view records only for customers who reside in the United States. Which is the best remedy that will achieve this?

      A. Encrypt the records that the analysts should not be permitted to

view.


      B. Provide a weekly extract of only the records they are permitted to

view.


      C. Create a database view containing only the records the analysts

may view.


      D. Implement a VDI located in the United States.


58. An organization is migrating its servers from physical to virtual. What privacy risks does the organization need to be concerned about concerning this migration?

      A. Guest OS privilege escalation


      B. Eavesdropping of sensitive network traffic


      C. Security hardening of the container layer


      D. Security hardening of the hypervisor layer


59. What is the primary risk related to split tunneling?

      A. Reduces network traffic visibility


      B. Creates excessive amounts of backhaul traffic


      C. Creates routing loops


      D. Decreases performance


60. At which stage of the life cycle of a software application is source code management no longer necessary?

      A. After the application is designed


      B. After the application is retired


      C. After initial implementation


      D. After formal requirements definition


61. To improve software quality, an organization wants to incorporate code scanning into the process so that developers will get immediate feedback during development. What tooling should be used to fulfill this purpose?

      A. Code scanning built into the IDE


      B. Code scanning built into the build system


      C. Code scanning built into the check-in process


      D. Code scanning performed quarterly by an outside firm


62. A software development manager is developing a policy and a set of principles that will result in better software hardening. Which organization should the software development manager use as the best source for software hardening information?

      A. DISA


      B. SANS


      C. EFF


      D. OWASP


63. Katherine recently resigned her position from a company after an investigation wrongly accused her of violating company policy. Using “the right to be forgotten” provisions in applicable privacy law, Katherine has requested the former employer remove her from employment records. How should the company respond?

      A. Update its records retention schedule to comply with the request.


      B. File a countersuit, arguing that the organization is not permitted to remove this data.


      C. Comply with applicable privacy law and discard the records as requested.


      D. Reply that applicable employment law forbids erasure of this data.


64. An organization’s marketing department purchases PII data from a data broker to embellish and update specific data fields for its existing customers. Upon examining the purchased data contents, marketing personnel realize that additional subjects are contained in the purchased data. What should be done with this additional data?

      A. Discard the additional data.


      B. Encrypt and retain the data for future use.


      C. Declare a privacy breach and begin response proceedings.


      D. Develop a marketing campaign and target the additional subjects.


65. Why is it important for users of corporate laptops to use VPN when communicating on open Wi-Fi hot spots?

      A. VPNs protect stored data on public networks.


      B. A VPN is necessary to reach an internal corporate network.


      C. Traffic on open Wi-Fi networks is not encrypted.


      D. Privacy laws require that corporate data be encrypted in transit.


66. A gaming software startup company does not employ penetration testing of its software. This is an example of:

      A. High tolerance of risk


      B. Noncompliance


      C. Irresponsibility


      D. Outsourcing


67. While gathering and examining various privacy-related business records, the privacy officer has determined that the organization has no privacy or security incident log. What conclusion can the privacy  officer make from this?

      A. The organization does not have privacy or security incident detection capabilities.


      B. The organization has not yet experienced a privacy or security incident.


      C. The organization is recording privacy or security incidents in its risk register.


      D. The organization has effective privacy policies.


68. An organization has performed a first-time data discovery scan on file servers and has identified numerous files that violate data handling standards. What is the best course of action to take?

      A. Investigate all files to determine their legitimacy.


      B. Delete all files that violate policy.


      C. Encrypt all files that violate policy.


      D. Contact the data owners.


69. A privacy auditor has observed that PII fields in a relational database are encrypted with the DES algorithm with 64-bit keys. Keys are held in split custody between two teams of operations specialists. What should the auditor conclude from this observation?

      A. The database encryption is strong.


      B. The database encryption is weak.


      C. The key management method is weak.


      D. The encryption cipher is adequate.


70. An organization is replacing an internally developed, on-premises ERP application with a SaaS application. What must the organization do to make legacy data available on the SaaS platform?

      A. Migrate data from the SaaS platform to the legacy platform.


      B. Import the data into the new application.


      C. Write a migration program.


      D. Develop a data flow diagram.


71. What is the best course of action for an organization to ensure that its customers’ PII is always properly handled?

      A. Implement a cloud access security broker (CASB).


      B. Implement NetFlow to detect unauthorized data movement.


      C. Implement data usage governance with policies, controls, and

assessments.


      D. Implement static DLP discovery scanning of databases and file

servers.


72. An e-commerce organization has elected to purchase information from a data broker in order to add more details to its existing customer database. What term describes this process?

      A. Data embellishment


      B. Data aggregation


      C. Data infiltration


      D. Data exfiltration


73. An organization periodically copies its customer database to a test environment. When doing so, names and other sensitive fields are substituted with made-up names and numbers. What substitution process is the organization performing?

      A. Data scrubbing


      B. Anonymization


      C. Pseudonymization


      D. Field erasure


74. An organization relying on physical access controls has migrated its on-premises applications to cloud service providers. What compensating control should be enacted for access to cloud-based applications since physical access is less of a factor?

      A. Multifactor authentication


      B. Biometrics


      C. Single sign-on


      D. Reduced sign-on


75. A risk manager is planning a first-ever risk assessment in an organization. What is the best approach for ensuring success?

      A. Interview personnel separately so that their responses can be

compared.


      B. Select a framework that matches the organization’s control

framework.


      C. Work with executive management to determine the correct

scope.


      D. Do not inform executive management until the risk assessment

has been completed.


76. When would it make sense to spend $50,000 to protect an asset worth

$10,000?

      A. If the protective measure reduced threat impact by more than 90

percent.


      B. It would never make sense to spend $50,000 to protect an asset

worth $10,000.


      C. If the asset was required for realization of $500,000 monthly

revenue.


      D. If the protective measure reduced threat probability by more than

90 percent


77. Privacy responsibilities are included in which of these IT positions?

      A. Security engineer


      B. Application developer


      C. Database administrator


      D. All of these


78. An organization has received a data subject request that asks the organization to remove all personal information on file. How should the organization respond?

      A. Pseudonymize the data subject’s personal information.


      B. Anonymize the data subject’s personal information.


      C. Remove or anonymize the data subject’s personal information.


      D. Remove or anonymize the data subject’s personal information as permitted by other applicable laws.


79. An organization wants to limit the use of USB external storage for the storage of personal information. What is the best first step to accomplish this?

      A. Implement software to detect uses of USB storage of personal information.


      B. Implement software to block uses of USB storage of personal information.


      C. Create a policy that defines limitations of USB storage.


      D. Disable USB ports on end-user computers.


80. An auditor is developing a plan for auditing privacy controls in a retail organization. What type of evidence should the auditor collect to determine whether data subject requests are recorded properly?

      A. Interview data subjects.


      B. Interview control owners.


      C. Examine business records.


      D. Examine privacy policy.


81. What is the best approach for developing a privacy policy in an organization subject to multiple privacy regulations?

      A. Include requirements for the regulation with the greatest number of requirements.


      B. Include only the requirements for the most recent privacy regulation.


      C. Include only the requirements common to all applicable privacy regulations.


      D. Include requirements from all applicable privacy regulations


82. A privacy and security steering committee empowered to make risktreatment decisions has chosen to accept a specific risk. What is the best course of action?

      A. Refer the risk to a qualified external security audit firm.


      B. Perform additional risk analysis to identify residual risk.


      C. Reopen the risk item for reconsideration after one year.


      D. Mark the risk item as permanently closed.


83. A new security manager is concerned about the increase in connected devices that are present on the enterprise network. What action would best mitigate this matter?

      A. Implement a SIEM.


      B. Use network segmentation.


      C. Use VLANs.


      D. Use network access controls.


84. An organization is considering moving its on-premises servers to an IaaS service. Which security controls will the organization need to continue operating?

      A. Operating system and network


      B. Operating system, network, and user access


      C. Physical only


      D. Physical, operating system, network, and user access


85. An organization is going to migrate its on-premises application to a SaaS environment. Which security controls will the organization need to continue operating?

      A. Operating system and network


      B. Physical


      C. User access


      D. Operating system and user access


86. An organization will be introducing smart TVs and other connected

devices into the enterprise network. Which of the following security

controls will most effectively protect the enterprise?

      A. Data loss prevention


      B. Annual penetration testing


      C. Adding smart devices to configuration management systems


      D. Network segmentation


87. A privacy manager is concerned that there may be excessive instances of PII on unstructured file shares. Which tool would best confirm or refute this suspicion?

      A. NAC


      B. DLP discovery


      C. CASB


      D. EUBA


88. An organization has developed data governance to gain visibility and control over the protection and use of personal information. What does management need to do to determine whether governance is having its intended effect?

      A. Direct control assessments to determine control effectiveness.


      B. Implement data management policies.


      C. Develop data management and handling training.


      D. Lead by example and demonstrate proper data handling.


89. The term legitimate interest refers to what privacy activity?

      A. The basis for a user access request


      B. Whether data collection is allowed by law


      C. The legal basis for processing personal information


      D. An alternative to lawful processing of personal information


90. When reviewing the classification of data files and databases, a privacy manager has identified a set of data files containing customer PII that has been classified as Public. What should the privacy manager do about this?

      A. No action is required.


      B. Reclassify the data files according to the data classification policy.


      C. Direct the de-identification of these files.


      D. Direct the removal of these files.


91. An organization wants to implement a control to provide the ability to detect bulk data transfers at network boundaries. What solution should be used?

      A. NetFlow


      B. Static DLP


      C. USB storage limitation


      D. Data tagging


92. How frequently should an organization revise its security and privacy standards?

      A. Annually and whenever significant new laws have been enacted


      B. Quarterly and whenever significant new laws have been enacted


      C. Annually


      D. Quarterly


93. At what point in the software development life cycle can detailed test plans be created?

      A. After coding has been completed


      B. After design has been finalized


      C. After requirements have been finalized


      D. After tests have been completed


94. A privacy officer wants to better understand where personal information appears in a system—in particular, which individual personal information elements (such as date of birth, address) exist. What design element should the privacy officer examine?

      A. Physical network diagram


      B. Logical network diagram


      C. Entity-relationship diagram


      D. Data flow diagram


95. Who performs unit testing, and what is its purpose?

      A. End users perform unit testing to confirm module functionality.


      B. Developers perform unit testing to confirm module functionality.


      C. Management performs unit testing to confirm developer

competency.


      D. End users perform unit testing to confirm screen-object

placement.


96. The computers used by call center personnel utilize solid-state drives (SSDs). Upon retirement, computers are removed from service and donated to a charity. What precautions should first be taken to ensure that all PII on these computers is destroyed?

      A. Run an erasure program on the HDDs.


      B. Shred the SSDs.


      C. Delete all files and reformat the SSDs.


      D. Run an erasure program on the SSDs.


97. An auditor is interviewing a network engineer who describes the enterprise network as being “flat.” To which of the following is the network engineer referring?

      A. The organization’s internal firewalls are set to “any any.”


      B. The organization’s network uses private addressing.


      C. The organization’s network consists of several collision domains.


      D. The organization’s network contains no internal access controls.


98. Which of the following is considered a best practice with regard to event logging?

      A. Retain all event logs on the systems that create them.


      B. Transmit all event logs to a central log server.


      C. Suppress the creation of event logs on all systems.


      D. Encrypt all event logs on the systems that create them.


99. All of the following are forms of control assessment except:

      A. Document review


      B. Control self-assessment


      C. Internal audit


      D. External audit


100. The concept of privacy and security tasks in the context of a SaaS or an IaaS environment is depicted in a:

      A. Discretionary control model


      B. Mandatory control model


      C. Monte Carlo risk model


      D. Shared responsibility model


101. What are the categories of risk treatment?

      A. Risk avoidance, risk transfer, risk mitigation, and risk acceptance


      B. Risk avoidance, risk transfer, and risk mitigation


      C. Risk avoidance, risk reduction, risk transfer, risk mitigation, and

risk acceptance


      D. Risk avoidance, risk treatment, risk mitigation, and risk

acceptance


102. The inclusion of privacy requirements in a new software development project is a direct offshoot of which principle?

      A. GDPR Article 21


      B. People, process, and technology


      C. Privacy by design and by default


      D. All answers are correct


103. What is the primary data privacy law in Canada?

      A. PIPEDA


      B. CCPA


      C. GDPR


      D. CICEDA


104. What is the purpose of data discovery scanning?

      A. Determine the presence of personal information in structured Data.

      B. Determine the presence of personal information in unstructured data.


      C. Observe the movement of personal information in internal network


      D. Observe the movement of personal information in external networks.


105. A new security manager is concerned about the increase in connected devices that may be present on the enterprise network. What tool(s) can best determine the extent of this situation?

      A. Network discovery scans


      B. Examine firewall logs


      C. Examine CASB logs


      D. Asset loss prevention plan


106. What risks will an organization with network-based IPS be assuming when its workforce is working remotely?

      A. Remote systems not on VPN will not be protected by the

network-based IPS.


      B. Network administrators will not be able to update the IPS as

often.


      C. Network-based IPS only protects devices physically in an

internal network.


      D. There’s no change in risk because network-based IPS systems

protect all devices regardless of location.


107. A privacy manager is developing a data classification program. She has established a matrix that consists of a total of 12 classifications that align to privacy, as well as intellectual property and payment information. What is the most likely scenario for the adoption of this program in the organization?

      A. Orderly adoption if training takes place


      B. Workforce will refuse to adopt


      C. Clear and determined adoption


      D. Confusion as the classification scheme is too complicated


108. All of the following tools can supplement dynamic DLP tools except which one?

      A. Cloud access security broker


      B. Web content filtering


      C. File integrity monitoring


      D. NetFlow


109. A privacy manager has developed a policy that requires that all human-readable files be marked according to their classification. What is the meaning of document marking?

      A. A metadata tag


      B. A machine-readable watermark


      C. A human-readable phrase citing the classification level


      D. A human-readable watermark


110. An organization performs annual true-ups of its data inventory and finds numerous discrepancies. What change should be undertaken to reduce or eliminate these discrepancies?

      A. Automate the data inventory with daily scans.


      B. Increase the frequency of data inventory.


      C. Incorporate data inventory updates into the change management

process.


      D. Implement dynamic DLP.


111. Privacy governance is most concerned with:

      A. Privacy policy


      B. Security policy


      C. Privacy strategy


      D. Security executive compensation


112. The best definition of a strategy is:

      A. The objective to achieve a plan


      B. The plan to achieve an objective


      C. The plan to achieve business alignment


      D. The plan to reduce risk


113. The primary factor related to the selection of a control framework is:

      A. Industry vertical


      B. Current process maturity level


      C. Size of the organization


      D. Compliance level


114. As part of understanding the organization’s current state, a privacy strategist is examining the organization’s privacy policy. What does the policy tell the strategist?

      A. The level of management commitment to privacy


      B. The compliance level of the organization


      C. The maturity level of the organization


      D. None of these


115. A privacy strategist has examined a business process and has determined that personnel who perform the process do so consistently, but there is no written process document. The maturity level of this process is:

      A. Initial


      B. Repeatable


      C. Defined


      D. Managed


116. A privacy strategist has examined several business processes and has found that their individual maturity levels range from Repeatable to Optimizing. What is the best future state for these business processes?

      A. All processes should be changed to Repeatable.


      B. All processes should be changed to Optimizing.


      C. There is insufficient information to determine the desired end states of these processes.


      D. Processes that are Repeatable should be changed to Defined.


117. An organization wants to fast-track the development of a consumer social media product and skip the requirements definition. What is the likely privacy-related consequence of this?

      A. Users will have to be re-registered.


      B. Audit logs will need to be scrubbed of PII.


      C. Rework will be necessary to comply with privacy laws.


      D. Personal information will need to be encrypted in storage.


118. A US state has enacted a sweeping new extraterritorial privacy regulation that focuses on cross-state border data transfer. What is the first step that an online social media vendor should take?

      A. Retain expert privacy counsel to opine on applicability and interpretation.


      B. Wait until the law takes effect to begin making changes to systems.


      C. Wait until there is sufficient case law to see whether the law is enforceable.


      D. Direct developers to make changes to the system to comply with the new law.


119. Marketing analysts want to create a data lake containing all CRM records and customer purchase information to help them better understand purchasing patterns. Because this is not a production system, marketing argues that PII should remain in the data lake to fulfill their research objectives. How should the privacy manager respond to this request?

      A. The data lake should be created as requested.


      B. All PII should be anonymized after insertion into the data lake.


      C. All PII should be pseudonymized before insertion into the data lake.


      D. All PII should be anonymized before insertion into the data lake.


120. To reduce the risk of credit card fraud, an organization has modified its CRM system so that only the last four digits of customers’ credit card numbers are displayed to call center personnel. What technique is being used?

      A. Data hiding


      B. Pseudonymization


      C. Anonymization


      D. Data masking


121. After an organization implemented dynamic DLP controls, the organization has observed numerous instances where PII is copied to USB external storage devices. What first steps should be taken?

      A. Investigate the usage of PII being copied to USB storage devices.


      B. Block the use of USB storage devices.


      C. Discipline the personnel copying PII to USB storage devices.


      D. Declare a privacy breach and begin incident response procedures.


122. A privacy manager is reviewing the organization’s practices of data collection from its customers. The privacy manager has observed that the organization collects PII fields that are not subsequently used. What recommendation should the privacy manager make?

      A. Discard all customer records containing the unneeded fields.


      B. Change the entry of unneeded fields from “required” to “optional.”


      C. Discontinue collection of unneeded PII fields.


      D. Discontinue collection of unneeded PII fields and discard those already collected.


123. An organization performs its periodic data retention procedure in which specific data files are being identified for removal. Analysts have identified some data files on backup tapes that qualify for removal. How should the organization proceed?

      A. Remove expired files from backup tapes.


      B. Retain backup tapes until all files have expired.


      C. Retain backup tapes until they are rotated out.


      D. Discard the backup tapes containing expired files.


124. An auditor has noted that an organization’s network routers are administered via the TELNET protocol. What should the auditor conclude from this?

      A. The organization employs a flat network.


      B. A sight-impaired administrator administers network routers.


      C. Network routers are adequately protected.


      D. A more secure protocol than TELNET should be used.


125. A messaging system employs hashes that accompany each message. What function can hashing perform in this context?

      A. Verify the integrity of a message.


      B. Verify the integrity and origination of a message.


      C. Guarantee the confidentiality of a message.


      D. Verify the origination of a message.


126. The purpose of a privacy and security steering committee includes:

      A. Business alignment


      B. Policy approval


      C. Risk decisions


      D. All of these


127. A privacy strategist is developing a privacy awareness program. What is the best method for ensuring that employees have retained important content?

      A. Measure the time it takes for employees to complete training.


      B. Include competency quizzes at the end of training sessions.


      C. Note how quickly employees complete training after being asked.


      D. Include videos in privacy training content.


128. What is the purpose of the cloud services shared responsibility model?

      A. Defines responsibilities when assigned to a project team


      B. Defines which parties are responsible for which aspects of privacy


      C. Defines which parties are responsible for which aspects of security and privacy


      D. Defines which parties are responsible for which aspects of security


129. Which of the following statements is true about compliance risk?

      A. Compliance risk can be tolerated when fines cost less than

controls.


      B. Compliance risk is just another risk that needs to be measured.


      C. Compliance risk can never be tolerated.


      D. Compliance risk can be tolerated when it is optional.


130. A privacy steering committee has voted to mitigate a specific risk. Some residual risk remains. What is the best course of action regarding the residual risk?

      A. Accept the residual risk and close the risk ledger item.


      B. Continue cycles of risk treatment until the residual risk reaches an acceptable level.


      C. Continue cycles of risk treatment until the residual risk reaches zero.


      D. Accept the residual risk and keep the risk ledger item open.


131. A security manager is developing a strategy for making improvements to the organization’s incident management process. Why would the organization’s privacy officer be requesting that a PIA be performed regarding the planned changes?

      A. To reduce the impact of privacy incidents


      B. To reduce the probability of privacy incidents


      C. To ensure that privacy incidents do not occur


      D. To ensure that a privacy incident is properly managed


132. The primary risks of end users being local administrators on their endpoints include all of the following except:

      A. Malware will execute at a privileged level and do more damage.


      B. Malware will not require human intervention to execute.


      C. Malware will be able to move laterally.


      D. Malware will be able to obtain password hashes.


133. An organization’s board of directors wants to see quarterly metrics on risk reduction. What would be the best metric for this purpose?

      A. Number of data subject requests received


      B. Viruses blocked by antivirus programs


      C. Packets dropped by the firewall


      D. Time to patch vulnerabilities on critical servers


134. Which of the following metrics is the best example of a leading indicator?

      A. Average time to mitigate security incidents


      B. Increase in the number of attacks blocked by the intrusion

prevention system (IPS)


      C. Increase in the number of attacks blocked by the firewall


      D. Percentage of critical servers being patched within service level

agreements (SLAs)


135. One primary difference between GDPR and CCPA is:

      A. GDPR requires an opt out while CCPA requires an opt in.


      B. Only GDPR asserts extraterritorial jurisdiction.


      C. Only CCPA asserts extraterritorial jurisdiction.


      D. GDPR requires an opt in while CCPA requires an opt out.


136. In an organization using HIPAA as its control framework, the conclusion of a recent risk assessment stipulates that additional  controls not present in HIPAA but present in ISO/IEC 27001 should be enacted. What is the best course of action in this situation?

      A. Adopt ISO/IEC 27001 as the new control framework.


      B. Retain HIPAA as the control framework and update process documentation.


      C. Add the required controls to the existing control framework.


      D. Adopt NIST SP 800-53 as the new control framework.


137. A privacy strategist is seeking to improve the privacy program in an organization with a strong but casual culture. What is the best approach here?

      A. Conduct focus groups to discuss possible avenues of approach.


      B. Enact new detective controls to identify personnel who are violating policy.


      C. Implement security awareness training that emphasizes new required behavior.


      D. Lock users out of their accounts until they agree to be compliant.


138. A privacy strategist recently joined a retail organization that operates with slim profit margins and has discovered that the organization lacks several important privacy capabilities. What is the best strategy here?

      A. Insist that management support an aggressive program quickly to improve the program.


      B. Develop a risk ledger that highlights all identified risks.


      C. Recommend that the biggest risks be avoided.


      D. Develop a risk-based strategy that implements changes slowly over an extended period of time.


139. An organization is implementing dynamic DLP in the form of USB storage device control. The use of USB storage devices will be prohibited according to data classification and security policy. How should the organization implement this control? 

      A. After announcements, activate the control after giving adequate notice.


      B. Initially implement in detective mode.


      C. Implement in active mode, one department at a time.


      D. Implement with a pilot group first.


140. A new privacy leader is making recommendations for a set of activities to ensure proper management of personal and other information across the organization. What needs to be put into place?

      A. Controls


      B. Data classification


      C. Data governance


      D. Data handling


141. An organization is migrating its customer database from an onpremises CRM to a cloud-based CRM. In the process of the migration, the organization created an intermediate flat-file database. How long should the intermediate flat-file database be retained?

      A. In perpetuity


      B. Until the migration is verified as completed


      C. According to the data classification guidelines


      D. According to the data retention schedule


142. To reduce risk, a privacy manager is advocating removing PII fields from an older database. What process is the privacy manager proposing?

      A. Anonymization


      B. Pseudonymization


      C. Hashing


      D. Masking


143. An organization has determined that its waterfall SDLC does not provide sufficient agility for the organization to respond to rapidly changing market forces. What steps should the organization take?

      A. Migrate to a SaaS application.


      B. Move to a DevSecOps development model.


      C. Migrate to a PaaS platform.


      D. Migrate to an object-oriented system.


144. Which of the following do web applications use to manage and distinguish users from one another?

      A. Session cookies


      B. Persistent cookies


      C. Flash local storage


      D. Web beacons


145. Which of the following best describes symmetric encryption?

      A. Plaintext and ciphertext occupy the same amount of storage.


      B. Encryption and decryption use the same algorithm.


      C. All parties have a copy of the encryption key.


      D. All parties have a copy of public keys.


146. The best first step in building privacy operations is:

      A. Perform a risk assessment.


      B. Identify requirements.


      C. Perform data discovery.


      D. Conduct a penetration test.


147. An organization requests that each data subject submit an image of their driver’s license as a means of authentication when submitting data subject requests. Should subsequent data subject requests cite the driver’s license as collected information?

      A. Yes, because authentication data is always subject to data access requests.


      B. No, because the driver’s license was collected outside of the collection period.


      C. No, because information submitted as a part of authentication is exempt.


      D. Yes, because the data subject’s driver’s license was collected by the organization.


148. What is the best method for ensuring that privacy incident responders are familiar with incident response procedures?

      A. Include incident responders in tabletop testing.


      B. Direct incident responders to develop incident response plans.


      C. Direct incident responders to respond to the next incident.


      D. Direct incident responders to review incident response plans.


149. Why is twisted pair considered more secure than Wi-Fi?

      A. Physical security controls must be compromised to reach wired

networks.


      B. Twisted pair uses better encryption algorithms.


      C. Physical security controls must be compromised to reach

wireless networks.


      D. Twisted pair has higher throughput capability.


150. The main reason for implementing application whitelisting on endpoints is:

      A. Permits end users to install only approved programs


      B. Prevents end users from installing applications


      C. Prevents end users from installing utilities


      D. Prevents malware from executing


151. A privacy manager has developed a scheme that prescribes required methods to protect information at rest, in motion, and in transit. This is known as a(n):

      A. Data classification policy


      B. Asset classification policy


      C. Data loss prevention plan


      D. Asset loss prevention plan


152. A privacy manager has been directed by executive management not to document a specific risk in the risk register. This course of action is known as:

      A. Burying the risk


      B. Transferring the risk


      C. Accepting the risk


      D. Ignoring the risk


153. A security manager is performing a risk assessment on a data center. The security manager has determined that unauthorized personnel can enter the data center through the loading dock door and shut off utility power to the building. This finding is known as a:

      A. Probability


      B. Threat


      C. Vulnerability


      D. Risk


154. An organization has begun implementation of its data classification program and wants to know the extent of storage of personal information on file servers. What is the first step that the organization should undertake?

      A. File integrity monitoring


      B. Dynamic DLP


      C. Dynamic discovery scan


      D. Static discovery scan


155. The purpose of a data classification and handling policy consists of all of the following except which one?

      A. A single method for data protection


      B. Efficient protection of information


      C. Risk-driven protection of information


      D. Direction to the workforce to apply proper handling procedures


156. Why would an organization with operations in Europe implement controls to ensure the accuracy of its customers’ PII?

      A. Required by CCPA


      B. Increases profit margins


      C. Increases revenue


      D. Required by GDPR


157. What is the purpose of system classification?

      A. Determine what files can be stored on a system


      B. Develop levels of protection


      C. Prerequisite to network segmentation


      D. Determine which systems require FIM


158. What is the purpose of identifying a data owner in a data inventory? 

      A. Data owners are responsible for data protection.


      B. Data owners respond to security incidents.


      C. Data owners approve DLP scanning.


      D. Data owners approve access requests.


159. An organization will be introducing voice-command smart TVs into the enterprise network. What is the primary risk associated with the introduction of such devices?

      A. Data leakage


      B. Unencrypted network traffic revealing PII


      C. Many smart devices cannot be patched


      D. Eavesdropping on private conversations


160. A privacy officer wants to better understand where personal information appears in a system. Which design element should the privacy officer examine?

      A. Physical network diagram


      B. Logical network diagram


      C. Entity-relationship diagram


      D. Data flow diagram


161. An organization stores unstructured data in a cloud-based storage service. In its routine data retention procedures, the organization has identified specific files stored by the storage service that need to be destroyed. How should the organization implement this control?

      A. Ask the owners of expired files to delete them.


      B. Delete expired files and remove any file recovery copies that may exist.


      C. Delete expired files.


      D. Ask the cloud storage service to shred the respective HDDs.


162. Personnel in an organization are discussing the de-identification of its older customer records. Marketing personnel are arguing that deidentification removes their ability to learn how specific customers buy services. How should the privacy manager respond? 

      A. No de-identification is necessary.


      B. Records should be archived.


      C. Records should be pseudonymized.


      D. Records should be anonymized.


163. A privacy manager is attending a planning meeting in which marketing personnel argue for the collection of PII from customers  that may be used sometime in the future. How should the privacy manager respond?

      A. Permit the collection of the additional PII fields.


      B. Require that the additional PII fields be encrypted.


      C. Forbid the collection of the additional PII fields.


      D. Update the data retention schedule to include the additional PII

fields.


164. Which of the following statements is true about data migration programs?

      A. Data migration programs are used for cross-border data transfers.


      B. Data migration programs are provided by software vendors.


      C. Data migration programs become a permanent part of the new

system.


      D. Data migration programs transfer information from an old

system to a new system.


165. In the context of cryptosystems, the term plaintext refers to which of the following?

      A. An unformatted text file


      B. An encryption key


      C. An unencrypted message


      D. An encrypted message


166. What is the most significant factor that compels an organization to implement a new control?

      A. Security or privacy breach


      B. New regulation


      C. Results of a risk assessment


      D. Contents of a control framework


167. Which of the following network media is used to carry broadband traffic in bulk?

      A. Twisted-pair


      B. 4G


      C. 5G


      D. Fiber-optic cable


168. Which protocol is most often transported on fiber-optic cabling by telecommunications providers?

      A. SONET


      B. DSL


      C. ISDN


      D. T-1


169. An organization wants to implement a data loss prevention (DLP) system. Which of the following is considered the best approach for such an implementation?

      A. Employ DLP in passive mode initially.


      B. Employ DLP in active mode initially.


      C. Set DLP in high-sensitivity mode.


      D. Employ DLP on e-mail systems first.


170. A privacy manager has directed that the team managing encryption keys update the password protecting encryption keys in a way that half the team members know one half of the password, and the other half of the team knows the other half of the password. What control has been implemented?

      A. Fail closed


      B. Least privilege


      C. Segregation of duties


      D. Split custody


===

Ujian ISACA CDPSE (Certified Data Privacy Solutions Engineer)

Ujian CDPSE dari ISACA adalah sertifikasi yang dirancang untuk para profesional yang terlibat dalam solusi privasi data. Fokusnya adalah pada implementasi teknis dan manajemen solusi privasi, yang selaras dengan praktik dan regulasi terbaru dalam privasi data. Sertifikasi CDPSE menilai kemampuan seseorang untuk menerapkan privasi secara desain, yang mengarah pada kepatuhan, manajemen data, dan perlindungan data yang lebih baik di dalam organisasi.


Manfaat Sertifikasi CDPSE

Pengakuan Profesional: Menunjukkan keahlian dalam privasi data dan memposisikan individu sebagai insinyur solusi privasi yang berharga.

Pengembangan Karir: Membuka peluang dalam bidang privasi data yang berkembang pesat.

Kredibilitas: Menambah kredibilitas profesional di bidang privasi dan perlindungan data.

Kekinian: Memastikan profesional tetap up-to-date dengan regulasi dan teknologi privasi yang berkembang.

Domain Ujian CDPSE

Ujian CDPSE mencakup tiga domain utama:


Privacy Governance: Pemahaman dan penerapan kerangka kerja serta prinsip tata kelola privasi.

Privacy Architecture: Desain dan implementasi arsitektur serta infrastruktur privasi data.

Data Lifecycle: Pengelolaan data sepanjang siklus hidupnya, memastikan privasi dan perlindungan.

Cara Mengambil Ujian

Pendaftaran Online: Mendaftar untuk ujian CDPSE melalui situs web ISACA.

Pilih Jadwal dan Lokasi Ujian: Ujian biasanya ditawarkan di pusat pengujian terakreditasi.

Biaya Ujian

Biaya ujian CDPSE bervariasi berdasarkan keanggotaan ISACA dan lokasi geografis. Informasi biaya terbaru dapat ditemukan di situs web ISACA.


Persyaratan Ujian

Pengalaman Kerja: Pengalaman relevan di bidang privasi data atau bidang terkait disarankan.

Latar Belakang Pendidikan: Latar belakang di IT, hukum, privasi, atau perlindungan data bermanfaat, tetapi tidak wajib.

Jumlah Soal dan Durasi Ujian

Ujian CDPSE terdiri dari pertanyaan pilihan ganda, dan durasinya biasanya 3,5 jam (dapat bervariasi, sehingga disarankan untuk memeriksa panduan ujian terbaru dari ISACA).


Manfaat Latihan Soal Ujian

Latihan soal ujian membantu dalam memahami format, meningkatkan pengetahuan tentang domain kunci, mengidentifikasi area yang perlu diperbaiki, dan membangun kepercayaan diri untuk ujian sebenarnya.


Profil Trainer Bapak Hery Purnama sebagai Trainer CDPSE Berpengalaman

Mengenai profil Bapak Hery Purnama sebagai trainer CDPSE berpengalaman


Sertifikasi CDPSE: Memegang sertifikasi CDPSE yang berlaku.

Pengalaman Praktis: Pengalaman luas dalam privasi dan perlindungan data.

Keterampilan Mengajar: Kemampuan untuk menyampaikan konsep-konsep kompleks secara efektif dan mempersiapkan kandidat untuk ujian.

Pengetahuan Terkini: Selalu mengikuti tren dan regulasi privasi data terbaru.

Sumber Daya Pelatihan: Menyediakan materi studi dan soal latihan yang berkualitas.

Seorang trainer berpengalaman seperti Bapak Hery Purnama dapat memainkan peran krusial dalam membimbing kandidat melalui proses sertifikasi CDPSE, menawarkan wawasan dari pengalaman dunia nyata dan membantu dalam persiapan ujian yang komprehensif.

0 comments:

Post a Comment

Silahkan isikan comment box untuk komentar Anda..