FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CDPSE Exam
  4. ISACA.CDPSE.v2025-11-10.q188 Dumps
  • ««
  • «
  • …
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • »
  • »»
Download Now

Question 116

Which of the following techniques mitigates design flaws in the application development process that may contribute to potential leakage of personal data?

Correct Answer: C
Explanation
Software hardening is a technique that mitigates design flaws in the application development process that may contribute to potential leakage of personal data. Software hardening is a process of modifying or configuring software to make it more secure and resilient against attacks or exploitation. Software hardening can involve various methods, such as removing unnecessary features or functions, disabling debugging or testing modes, applying patches or updates, implementing secure coding practices, etc. Software hardening helps to protect personal data by preventing or reducing the vulnerabilities that can allow unauthorized access, use, disclosure, or transfer of personal data. References: : CDPSE Review Manual (Digital Version), page 151
insert code

Question 117

Which of the following is MOST important to capture in the audit log of an application hosting personal data?

Correct Answer: B
The most important information to capture in the audit log of an application hosting personal data is the last user who accessed personal dat a. This is because the audit log is a record of the activities and events that occur within the application, such as user actions, system events, errors, or exceptions. The audit log helps to monitor and verify the compliance, security, and performance of the application, as well as to detect and investigate any incidents or anomalies. Capturing the last user who accessed personal data in the audit log helps to ensure the accountability and traceability of the data access, as well as to identify and prevent any unauthorized or inappropriate use, disclosure, or modification of personal data.
insert code

Question 118

Within a regulatory and legal context, which of the following is the PRIMARY purpose of a privacy notice sent to customers?

Correct Answer: C
A privacy notice is a document that informs data subjects about how their personal data is collected, processed, stored, shared, and protected by an organization. The primary purpose of a privacy notice is to provide transparency to the data subject on the intended use of their personal data, as well as their rights and choices regarding their data. A privacy notice also helps the organization comply with legal and regulatory requirements, such as obtaining consent, demonstrating accountability, and fulfilling the principle of fairness and lawfulness.
insert code

Question 119

Which of the following should be considered personal information?

Correct Answer: A
Biometric records are personal information that can be used to identify an individual based on their physical or behavioral characteristics, such as fingerprints, facial recognition, iris scans, voice patterns, etc. Biometric records are considered sensitive personal information that require special protection and consent from the data subject. Biometric records can be used for various purposes, such as authentication, identification, security, etc., but they also pose privacy risks, such as unauthorized access, use, disclosure, or transfer of biometric data. Reference: : CDPSE Review Manual (Digital Version), page 25
insert code

Question 120

A mortgage lender has created an online application that collects borrower information and delivers a mortgage decision automatically based on criteria set by the lender. Which fundamental data subject right does this process infringe upon?

Correct Answer: C
The right not to be profiled is the right of data subjects to not be subject to a decision based solely on automated processing, including profiling, which produces legal or similarly significant effects on them. The online application that delivers a mortgage decision automatically based on criteria set by the lender is an example of such a decision, as it affects the data subject's ability to obtain a loan.
Reference:
What exactly is 'profiling' under the GDPR - DMA
Can I be subject to automated individual decision-making, including profiling - European Commission
insert code
  • ««
  • «
  • …
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CDPSE.v2025-11-10.q188 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.