Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

DCPLA Exam Dumps - DSCI Certified Privacy Lead Assessor

Go to page:
Question # 9

Which of the following factors is least likely to be considered while implementing or augmenting data security solution for privacy protection?

A.

Security controls deployment at the database level

B.

Information security infrastructure up-gradation in the organization

C.

Classification of data type and its usage by various functions in the organization

D.

Training and awareness program for third party organizations

Full Access
Question # 10

From the following list, identify the technology aspects that are specially designed for upholding privacy:

I) Data minimization

II) Intrusion prevention system

III) Data scrambling

IV) Data loss prevention

V) Data portability

VI) Data obfuscation

VII) Data encryption

VIII) Data mirroring

A.

Only I, III, V, VII and VIII

B.

Only I, II, III, VII and VIII

C.

Only I, III, IV, VI and VII

D.

Only II, V, VI, VII and VIII

Full Access
Question # 11

With respect to privacy implementation, organizations should strive for which of the following:

A.

Meaningful compliance

B.

Demonstrable accountability

C.

Checklist based exercise

D.

None of the above

Full Access
Question # 12

What are the Nine Privacy Principles as described in DSCI Privacy Framework (DPF©)?

I) Use Limitation

II) Accountability

III) Data Quality

IV) Notice

V) Preventing Harm

VI) ChoiceandConsent

VII) Access and Correction

VIII) Data Minimization

IX) Openness

X) Disclosure to Third Parties

XI) Right to be Forgotten

XII) Collection limitation

XIII) Security

A.

I, II, III, IV, V, VI, VII, VIII, IX

B.

I, II, IV, V, VI, VII, IX, X, XII, XIII

C.

I, II, III, IV, V, VI, VII, VIII, XII

D.

I, II, III, IV, VII, VIII, IX, X, XI

Full Access
Question # 13

Arrange the following techniques in decreasing order of the risk of re-identification:

I) Pseudonymization

II) De-identification

III) Anonymization

A.

I, II

B.

III, II, I

C.

II, III, I

D.

All have equal risk of re-identification

Full Access
Question # 14

Which of the following are the key factors that need to be considered for determining the applicability of the privacy principles? (Choose all that apply.)

A.

The role of the organization in determining the purpose of the data collection

B.

How and where the data is coming in the organization

C.

Requirements stipulated by the local authorities from where the organization operating

D.

Organization’s commitment to the external stakeholder with respect to privacy

Full Access
Question # 15

The method of personal data usage in which the users must explicitly decide not to participate.

A.

Opt-In

B.

Opt-out

C.

Data mining

D.

Data matching

Full Access
Question # 16

A newly appointed Data Protection Officer is reviewing the organization’s existing privacy policy. Which of the following would be the most critical factor for the review process?

A.

Awareness of the business units about the privacy policy

B.

Changes in the legal/regulatory regime

C.

Privacy policies of industry peers

D.

Foreseeable challenges in the effective implementation of the policy

Full Access
Go to page: