Isaca Certified Data Privacy Solutions Engineer Exam Practice Test

Page: 1 / 14
Total 218 questions
Question 1

Which of the following principles is MOST important to apply when granting access to an enterprise resource planning (ERP) system that contains a significant amount of personal data?



Answer : B

The principle of least privilege is the most important principle to apply when granting access to an ERP system that contains a significant amount of personal dat

a. The principle of least privilege states that users should only have the minimum level of access and permissions necessary to perform their legitimate tasks and functions, and no more. Applying the principle of least privilege helps to protect the privacy and security of the personal data in the ERP system, as it reduces the risk of unauthorized or inappropriate access, disclosure, modification, or deletion of the data. It also helps to comply with the privacy laws and regulations, such as the GDPR, that require data controllers and processors to implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.


Question 2

Which of the following is the BEST indication of a highly effective privacy training program?



Question 3

An online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities. Which data protection principle is applied?



Answer : C

The data protection principle that is applied when an online business posts its customer data protection notice that includes a statement indicating information is collected on how products are used, the content viewed, and the time and duration of online activities is lawfulness and fairness. Lawfulness and fairness are two of the core principles of data protection under various laws and regulations, such as the GDPR or the CCPA. They state that personal data should be processed lawfully, fairly and in a transparent manner in relation to the data subject. By posting a customer data protection notice that informs customers about what information is collected and for what purpose, the online business demonstrates its compliance with these principles.

System use requirements, data integrity and confidentiality, or data use limitation are not the correct names of the data protection principles that are applied in this case. System use requirements are not a specific principle of data protection, but rather a general term that refers to the rules or policies that govern how users can access and use a system or service. Data integrity and confidentiality are two aspects of the security principle of data protection, which states that personal data should be processed in a manner that ensures appropriate security of the personal data. Data use limitation is not a specific principle of data protection either, but rather a concept that relates to the purpose limitation principle, which states that personal data should be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes.


Question 4

An organization Wishes to deploy strong encryption to its most critical and sensitive databases. Which of the following is the BEST way to safeguard the encryption keys?



Answer : C

The best way to safeguard the encryption keys is to ensure that they are stored in a cryptographic vault. A cryptographic vault is a secure hardware or software module that provides cryptographic services and protects the keys from unauthorized access, modification, or disclosure. A cryptographic vault can also provide other functions, such as key generation, key backup, key rotation, key destruction, and key auditing. A cryptographic vault can enhance the security and privacy of the encrypted data by preventing key compromise, leakage, or misuse. A cryptographic vault can also comply with the security standards and best practices for key management, such as the ISO/IEC 27002, NIST SP 800-57, or PCI DSS.Reference:

[ISACA Glossary of Terms]

[ISACA CDPSE Review Manual, Chapter 3, Section 3.3.3]

[ISACA Journal, Volume 4, 2019, ''Key Management in the Multi-Cloud Environment'']

[ISACA CDPSE Review Manual, Chapter 3, Section 3.3.4]


Question 5

Which of the following is the MOST important privacy consideration when developing a contact tracing application?



Question 6

When can data subjects be prohibited from withdrawing consent for processing their personal data?



Question 7

Which of the following scenarios should trigger the completion of a privacy impact assessment (PIA)?



Answer : B

A privacy impact assessment (PIA) is a process of analyzing the potential privacy risks and impacts of collecting, using, and disclosing personal dat

a. A PIA should be conducted when there is a change in the data processing activities that may affect the privacy of individuals or the compliance with data protection laws and regulations. One of the scenarios that should trigger the completion of a PIA is when there are new inter-organizational data flows, which means that personal data is shared or transferred between different entities or jurisdictions. This may introduce new privacy risks, such as unauthorized access, misuse, or breach of data, as well as new legal obligations, such as obtaining consent, ensuring adequate safeguards, or notifying authorities.


PIA Triggers - International Association of Privacy Professionals

Privacy Impact Assessment - International Association of Privacy Professionals

GDPR Privacy Impact Assessment

Data Protection Impact Assessment triggers: Clarity or confusion?

Page:    1 / 14   
Total 218 questions