ISACA CDPSE
Q: 1
What should be the PRIMARY consideration of a multinational organization deploying a user and
entity behavior analytics (UEBA) tool to centralize the monitoring of anomalous employee behavior?
Options
Q: 2
Which of the following is MOST important when designing application programming interfaces (APIs)
that enable mobile device applications to access personal data?
Options
Q: 3
Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection
against a man-in-the-middle attack?
Options
Q: 4
Which of the following activities would BEST enable an organization to identify gaps in its privacy
posture?
Options
Q: 5
Which of the following BEST ensures an effective data privacy policy is implemented?
Options
Q: 6
Which of the following is MOST important to capture in the audit log of an application hosting
personal data?
Options
Q: 7
Which of the following technologies BEST facilitates protection of personal data?
Options
Q: 8
Which of the following is the BEST way for senior management to verify the success of its
commitment to privacy by design?
Options
Q: 9
Which of the following is the BEST course of action to prevent false positives from data loss
prevention (DLP) tools?
Options
Q: 10
Which of the following is the PRIMARY objective of privacy incident response?
Options
Question 1 of 10