New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CDPSE Exam - Topic 3 Question 61 Discussion

Actual exam question for Isaca's CDPSE exam
Question #: 61
Topic #: 3
[All CDPSE Questions]

Which of the following is the BEST way for an organization to limit potential data exposure when implementing a new application?

Show Suggested Answer Hide Answer
Suggested Answer: D

Privacy by design is an approach that embeds privacy principles and considerations into the design and development of products, services, systems, and processes that involve personal dat

a. Privacy by design aims to protect the privacy and security of the data subjects, as well as to comply with the applicable privacy laws and regulations. One of the key principles of privacy by design is to obtain the consent and choice of the data subjects regarding the collection, use, and disclosure of their personal data. Therefore, the best example of privacy by design in the development of a consumer mobile application is to require consent before sharing locations, as this gives the data subjects control and transparency over their personal data. The other options are not as effective or sufficient as requiring consent before sharing locations, as they do not address the principle of consent and choice, or they may violate other privacy principles or requirements.


Contribute your Thoughts:

0/2000 characters
Viola
3 months ago
Totally agree with the need for encryption!
upvoted 0 times
...
Tamesha
3 months ago
Wait, capturing logs? How does that limit data exposure?
upvoted 0 times
...
Jestine
3 months ago
Encrypting data is crucial, but it’s not the only solution.
upvoted 0 times
...
Yun
4 months ago
I think using only the data required is the best approach!
upvoted 0 times
...
Eloisa
4 months ago
DLP systems are super effective for data protection.
upvoted 0 times
...
Mila
4 months ago
Capturing authentication logs seems useful, but I doubt it would limit data exposure as much as the other options.
upvoted 0 times
...
Solange
4 months ago
I feel like implementing a DLP system could be effective, but it might not address all potential exposure risks.
upvoted 0 times
...
Jesusita
4 months ago
I remember a practice question that emphasized the importance of data encryption, so I might lean towards option C, but I need to think about the context.
upvoted 0 times
...
Blondell
5 months ago
I think using only the data required by the application makes the most sense, but I'm not entirely sure if that's the best option overall.
upvoted 0 times
...
Abraham
5 months ago
Capturing authentication logs could help with monitoring and incident response, but I'm not sure if that's the "best" way to limit data exposure upfront.
upvoted 0 times
...
Janey
5 months ago
Data encryption is always a solid security practice, but I wonder if there's an even better approach for this specific scenario.
upvoted 0 times
...
Viola
5 months ago
Okay, let's see. I think using only the required data is a good way to limit exposure, but I wonder if there are other strategies I'm missing.
upvoted 0 times
...
Vivienne
5 months ago
Hmm, I'm not sure about this. I'll need to think it through carefully to make sure I pick the best option.
upvoted 0 times
...
Lettie
5 months ago
This seems like a straightforward security question. I'm pretty confident I can handle this one.
upvoted 0 times
...
Lou
10 months ago
Hold up, so we're talking about limiting data exposure, not making the IT guy's job easier. Encrypt all the things, I say!
upvoted 0 times
Kyoko
8 months ago
C) Encrypt all data used by the application.
upvoted 0 times
...
Delmy
8 months ago
B) Use only the data required by the application.
upvoted 0 times
...
Ivan
8 months ago
A) Implement a data loss prevention (DLP) system.
upvoted 0 times
...
...
Dolores
10 months ago
I hear ya, guys. Encrypting all the data is like putting a padlock on a goldfish bowl - it's a bit overkill, don't you think?
upvoted 0 times
Kimbery
9 months ago
C) Encrypt all data used by the application.
upvoted 0 times
...
Ciara
9 months ago
B) Use only the data required by the application.
upvoted 0 times
...
Lauran
9 months ago
A) Implement a data loss prevention (DLP) system.
upvoted 0 times
...
...
Beckie
10 months ago
Option D might be good for tracking down any breaches, but it's not going to actually prevent the data exposure in the first place. B and C are the way to go here.
upvoted 0 times
...
Refugia
10 months ago
Hmm, I'm going with C. Encrypting everything is the surest way to keep that sensitive data under lock and key. Better safe than sorry, am I right?
upvoted 0 times
Dominga
9 months ago
C) Encrypt all data used by the application.
upvoted 0 times
...
Renea
9 months ago
B) Use only the data required by the application.
upvoted 0 times
...
Rolande
10 months ago
A) Implement a data loss prevention (DLP) system.
upvoted 0 times
...
...
Dewitt
10 months ago
I'm torn between B and C. Encrypting all data is a great way to protect it, but you have to make sure you're only using what you need in the first place.
upvoted 0 times
...
Tyra
10 months ago
The best way to limit data exposure is definitely option B - using only the data required by the application. Anything extra is just asking for trouble!
upvoted 0 times
...
Alesia
10 months ago
I believe using only the data required by the application is also important to limit exposure.
upvoted 0 times
...
Micah
11 months ago
I agree with Jean. Encrypting the data will provide an extra layer of security.
upvoted 0 times
...
Jean
11 months ago
I think the best way is to encrypt all data used by the application.
upvoted 0 times
...

Save Cancel