FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CDPSE Exam
  4. ISACA.CDPSE.v2025-11-10.q188 Dumps
  • ««
  • «
  • …
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
Download Now

Question 166

Which of the following is the best reason for a health organization to use desktop virtualization to implement stronger access control to systems containing patient records?

Correct Answer: A
insert code

Question 167

Which of the following should be done FIRST to establish privacy to design when developing a contact-tracing application?

Correct Answer: A
Explanation
Conducting a privacy impact assessment (PIA) should be done first to establish privacy by design when developing a contact-tracing application. A PIA is a systematic process that identifies and evaluates the potential effects of personal data processing operations on the privacy of individuals and the organization. A PIA helps to identify privacy risks and mitigation strategies at an early stage of development and ensures compliance with legal and regulatory requirements. Conducting a development environment review, identifying privacy controls, or identifying differential privacy techniques are important steps in privacy by design, but they should be done after conducting a PIA. References: CDPSE Exam Content Outline, Domain
2, Task 2.1
insert code

Question 168

An organization uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings. Which of the following is the IT privacy practitioner's BEST recommendation?

Correct Answer: A
Anonymization is a technique that removes or modifies all identifiers in a data set to prevent or limit the identification of the data subjects. Anonymization is the IT privacy practitioner's best recommendation for an organization that uses analytics derived from archived transaction data to create individual customer profiles for customizing product and service offerings, as it would protect the privacy of the customers by reducing the linkability of the data set with their original identity, and also comply with the data minimization principle that requires limiting the collection, storage and processing of personal data to what is necessary and relevant for the intended purposes. Anonymization would also preserve some characteristics or patterns of the original data that can be used for analysis or customization purposes, without compromising the accuracy or quality of the results. The other options are not as effective as anonymization in this situation. Discontinuing the creation of profiles is not a feasible or desirable option, as it would prevent the organization from achieving its business objectives and providing value to its customers. Implementing strong access controls is a security measure that restricts who can access, view or modify the data, but it does not address the issue of collecting or retaining more personal data than necessary or relevant. Encrypting data at rest is a security measure that transforms plain text data into cipher text using an algorithm and a key, making it unreadable by unauthorized parties, but it does not address the issue of collecting or retaining more personal data than necessary or relevant, and may require additional security measures to protect the encryption keys or certificates1, p. 75-76 Reference: 1: CDPSE Review Manual (Digital Version)
insert code

Question 169

Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?

Correct Answer: B
insert code

Question 170

A multi-national organization has decided that regional human resources (HR) team members must be limited in their access to employee data only within their regional office. Which of the following is the BEST approach?

Correct Answer: B
Explanation
Attribute-based access control (ABAC) is the best approach for limiting the access of regional HR team members to employee data only within their regional office, because it allows for fine-grained and dynamic access control based on attributes of the subject, object, environment, and action. Attributes are characteristics or properties that can be used to describe or identify entities, such as users, resources, locations, roles, or permissions. ABAC uses policies and rules that evaluate the attributes and grant or deny access accordingly.
For example, an ABAC policy could state that a user can access an employee record if and only if the user's role is HR and the user's region matches the employee's region. This way, the access control can be tailored to the specific needs and context of the organization, without relying on predefined or fixed access levels.
References:
* Attribute-Based Access Control (ABAC), NIST
* What is Attribute-Based Access Control (ABAC)?, Axiomatics
* Access Control Models - Westoahu Cybersecurity, Westoahu Cybersecurity
insert code
  • ««
  • «
  • …
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • »
[×]

Download PDF File

Enter your email address to download ISACA.CDPSE.v2025-11-10.q188 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.