FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CDPSE Exam
  4. ISACA.CDPSE.v2024-06-06.q116 Dumps
  • ««
  • «
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • »
  • »»
Download Now

Question 81

Which of the following is the BEST way to limit the organization's potential exposure in the event of consumer data loss while maintaining the traceability of the data?

Correct Answer: B
Explanation
De-identification is a technique that removes or modifies direct and indirect identifiers in a data set to prevent or limit the identification of the data subjects. De-identification reduces the risk of re-identification and thus limits the organization's potential exposure in the event of consumer data loss. De-identification also maintains the traceability of the data by preserving some characteristics or patterns of the original data that can be used for analysis or research purposes. The other options are not effective ways to limit exposure and maintain traceability1, p. 75-76 References: 1: CDPSE Review Manual (Digital Version)
insert code

Question 82

Which of the following is the PRIMARY reason to use public key infrastructure (PRI) for protection against a man-in-the-middle attack?

Correct Answer: C
Explanation
Public key infrastructure (PKI) is a system that enables the use of public key cryptography, which is a method of encrypting and authenticating data using a pair of keys: a public key and a private key. Public key cryptography can protect against man-in-the-middle (MITM) attacks, which are attacks where an attacker intercepts and modifies the communication between two parties. PKI makes public key cryptography feasible by providing a way to generate, distribute, verify, and revoke public keys. PKI also uses digital certificates, which are documents that bind a public key to an identity, and certificate authorities, which are trusted entities that issue and validate certificates. By using PKI, the parties can ensure that they are communicating with the intended recipient and that the data has not been tampered with by an attacker.
References:
* What is Public Key Infrastructure (PKI)? - Fortinet
* How is man-in-the-middle attack prevented in TLS? [duplicate]
* A brief look at Man-in-the-Middle Attacks and the Role of Public Key Infrastructure (PKI)
insert code

Question 83

What type of personal information can be collected by a mobile application without consent?

Correct Answer: B
insert code

Question 84

Which of the following is the BEST indication of an effective records management program for personal data?

Correct Answer: D
Explanation
A retention schedule is a document that specifies how long different types of records or data should be kept and when they should be deleted or disposed of, based on legal, regulatory, operational or historical requirements. A retention schedule is the best indication of an effective records management program for personal data, as it reflects the principles of data minimization and storage limitation, which require limiting the collection, storage and processing of personal data to what is necessary and relevant for the intended purposes, and deleting or disposing of personal data when it is no longer needed or justified. A retention schedule also helps to reduce the privacy risks and costs associated with data storage and retention, such as data breaches, unauthorized access, misuse or loss of data. The other options are not as indicative of an effective records management program for personal data as a retention schedule. Archived data is used for future analytics may indicate that the organization is leveraging its data assets for business intelligence or research purposes, but it may not comply with the principles of data minimization and storage limitation, or the privacy rights and preferences of the data subjects. The legal department has approved the retention policy may indicate that the organization has obtained legal advice or guidance on its records management program for personal data, but it may not reflect the actual implementation or execution of the retention policy. All sensitive data has been tagged may indicate that the organization has implemented a data classification scheme for its records or data, but it may not indicate how long the records or data should be kept or when they should be deleted or disposed of1, p. 99-100 References: 1: CDPSE Review Manual (Digital Version)
insert code

Question 85

Which of the following should be done NEXT after a privacy risk has been accepted?

Correct Answer: A
Explanation
After a privacy risk has been accepted, the next step is to monitor the risk landscape for material changes. This means that the organization should keep track of any internal or external factors that may affect the likelihood or impact of the risk, such as new threats, vulnerabilities, regulations, technologies, or business processes.
Monitoring the risk landscape can help the organization identify if the risk acceptance decision is still valid, or if it needs to be revisited or revised. Monitoring can also help the organization prepare for potential incidents or consequences that may arise from the accepted risk.
insert code
  • ««
  • «
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CDPSE.v2024-06-06.q116 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.