Certified Data Privacy Solutions Engineer-CDPSE Quiz Questions and Answers

Which of the following is a primary role and responsibility of a privacy incident response team?

Answer :
  • Work closely with the information security department and other organizational key stakeholders to coordinate privacy incident response activities and data collection

Which of the following best describes an advantage of using cloud computing over on-premises infrastructure?

Answer :
  • Increased scalability

Which of the following best provides message integrity, authentication of sender’s identity, and nonrepudiation?

Answer :
  • Public key infrastructure

Which of the following privacy threats is also used as a tool in data security?

Answer :
  • Non-Repudiation

A privacy engineer has used privacy standards to establish requirements or recommendations within a wide range of services and products. Which of the following is the main purpose of this activity?

Answer :
  • Create Control to Protect Personal Information

Tuft has hired Nathan who is responsible for managing specifically assigned scopes of privacy management program activities and supporting efforts in the company. Which privacy-specific role does this role description identify with?

Answer :
  • Privacy Manager

Which of the following metrics will help to measure the educational impact and effectiveness of privacy training?

Answer :
  • Number of breaches that occurred prior to training compared with after training.

At Tuft, one of the esteemed customers had to face a lot of emotional distress due to a privacy harm incident. The customer had shared a video of the accident involving his family members with Tuft for claiming insurance. However, the video was accessed by...

Answer :
  • Dignity Loss

Which of the following events triggers a PIA?

Answer :
  • Preparation for a Privacy Certification Audit

Melisa has joined as a new member in the information security management team at Cypress. She wants to remove the access rights of employees who have left the organization. Which access rights should she remove?

Answer :
  • Identification Cards