Which of the following zones within a data lake requires sensitive data to be encrypted or tokenized?
Correct Answer: C
Explanation A raw zone is a zone within a data lake that contains unprocessed or unstructured data that is ingested from various sources without any transformation or validation. A raw zone may contain sensitive data that has not been identified or classified yet, such as personal data. Therefore, sensitive data in a raw zone should be encrypted or tokenized to protect its confidentiality and integrity. Encryption is a process of transforming data into an unreadable form using a secret key or algorithm. Tokenization is a process of replacing sensitive data with non-sensitive substitutes called tokens. Both encryption and tokenization help to prevent unauthorized or unlawful access, use, disclosure, or transfer of sensitive data in a raw zone. References: : CDPSE Review Manual (Digital Version), page 169
Question 67
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
Correct Answer: A
Question 68
Which of the following should an IT privacy practitioner do FIRST before an organization migrates personal data from an on-premise solution to a cloud-hosted solution?
Correct Answer: A
Question 69
Which of the following is the BEST control to prevent the exposure of personal information when redeploying laptops within an organization?
Correct Answer: D
Explanation Performing a full wipe and reimage of the laptops is the best control to prevent the exposure of personal information when redeploying laptops within an organization. This is because a full wipe and reimage ensures that all data, including personal information, is securely erased from the laptops and replaced with a fresh installation of the operating system and applications. This reduces the risk of data leakage, unauthorized access, or data recovery by malicious actors or unauthorized users. The other options are not as effective or sufficient as a full wipe and reimage, as they do not guarantee the complete removal of personal information from the laptops. References: CDPSE Review Manual, 2021, p. 147
Question 70
It is MOST important to consider privacy by design principles during which phase of the software development life cycle (SDLC)?
Correct Answer: A
Explanation Requirements definition is a phase of the software development life cycle (SDLC) that involves gathering, analyzing and documenting the functional and non-functional requirements of the software system or application, such as features, performance, security and usability. It is most important to consider privacy by design principles during this phase, as it would help to ensure that privacy is embedded and integrated into the software system or application from the outset, rather than as an afterthought or an add-on. Considering privacy by design principles during requirements definition would also help to avoid costly rework or delays later in the SDLC, as well as to enhance customer trust and satisfaction, and comply with privacy laws and regulations. The other options are not as important as requirements definition in considering privacy by design principles. Application design is a phase of the SDLC that involves creating and specifying the architecture, components, interfaces and data models of the software system or application, based on the requirements defined in the previous phase. Implementation is a phase of the SDLC that involves coding, testing and debugging the software system or application, based on the design specifications created in the previous phase. Testing is a phase of the SDLC that involves verifying and validating that the software system or application meets the requirements and expectations of the users and stakeholders, as well as identifying and fixing any defects or errors1, p. 88-89 References: 1: CDPSE Review Manual (Digital Version)