Handsome Savings - Limited Time Offer 30% OFF - Ends In 0d 0h 0m 0s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Isaca CDPSE Exam Actual Questions

The questions for CDPSE were last updated on Oct 3, 2024.
  • Viewing page 1 out of 44 pages.
  • Viewing questions 1-5 out of 218 questions
Unlock Access to All 218 Questions & Answers
Question No. 1

Which of the following is the MOST important consideration for determining the operational life of an encryption key?

Show Answer Hide Answer
Correct Answer: C

The most important consideration for determining the operational life of an encryption key is the volume and sensitivity of data protected by the key. The operational life of an encryption key is the period of time during which the key can be used securely and effectively to encrypt and decrypt data. The operational life of an encryption key depends on various factors, such as the length and complexity of the key, the strength and speed of the encryption algorithm, the number and frequency of encryption operations, the number of entities involved in communication, and the number of digitally signed documents in force. However, among these factors, the volume and sensitivity of data protected by the key is the most critical, as it affects the risk and impact of a potential compromise or exposure of the key. The higher the volume and sensitivity of data protected by the key, the shorter the operational life of the key should be, as this reduces the window of opportunity for an attacker to access or misuse the data.


Question No. 2

Which of the following is the BEST way to ensure that application hardening is included throughout the software development life cycle (SDLC)?

Show Answer Hide Answer
Correct Answer: B

The best way to ensure that application hardening is included throughout the software development life cycle (SDLC) is to include qualified application security personnel as part of the process. Application hardening is the process of applying security measures and techniques to an application to reduce its attack surface, vulnerabilities, and risks. Application hardening should be integrated into every stage of the SDLC, from planning and design to development and testing to deployment and maintenance. Including qualified application security personnel as part of the process helps to ensure that application hardening is performed effectively and consistently, as well as to provide guidance, feedback, and support to the developers, testers, and project managers. The other options are not as effective or sufficient as including qualified application security personnel as part of the process, as they do not address the root cause of the lack of application hardening, which is the gap in skills and knowledge among the SDLC participants.


Question No. 3

An increase in threats originating from endpoints is an indication that:

Show Answer Hide Answer
Correct Answer: C

Extended detection and response (XDR) is a security solution that collects and analyzes data from multiple sources, such as endpoints, networks, servers, cloud, and applications, to detect and respond to threats in real time. XDR should be installed to address the increase in threats originating from endpoints, as it provides a holistic and integrated view of the threat landscape, as well as automated and coordinated actions to contain and remediate the threats. XDR also helps to improve the visibility, efficiency, and effectiveness of the security operations, as well as to reduce the complexity and costs of managing multiple security tools.


Question No. 4

Which of the following BEST illustrates privacy by design in the development of a consumer mobile application?

Show Answer Hide Answer
Correct Answer: D

Privacy by design is an approach that embeds privacy principles and considerations into the design and development of products, services, systems, and processes that involve personal dat

a. Privacy by design aims to protect the privacy and security of the data subjects, as well as to comply with the applicable privacy laws and regulations. One of the key principles of privacy by design is to obtain the consent and choice of the data subjects regarding the collection, use, and disclosure of their personal data. Therefore, the best example of privacy by design in the development of a consumer mobile application is to require consent before sharing locations, as this gives the data subjects control and transparency over their personal data. The other options are not as effective or sufficient as requiring consent before sharing locations, as they do not address the principle of consent and choice, or they may violate other privacy principles or requirements.


Question No. 5

Who is ULTIMATELY accountable for the protection of personal data collected by an organization?

Show Answer Hide Answer
Correct Answer: B

The data owner is the person or entity who has the ultimate authority and responsibility for the protection of personal data collected by an organization. The data owner defines the purpose, scope, classification, and retention of the personal data, as well as the rights and obligations of the data subjects and other parties involved in the data processing. The data owner also ensures that the personal data is handled in compliance with the applicable privacy laws and regulations, as well as the organization's privacy policies and standards. The data owner may delegate some of the operational tasks to the data processor, data custodian, or data protection officer, but the accountability remains with the data owner.


Product Image

Unlock All Questions for Isaca CDPSE Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 218 Questions & Answers