New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CDPSE Exam - Topic 7 Question 9 Discussion

Actual exam question for Isaca's CDPSE exam
Question #: 9
Topic #: 7
[All CDPSE Questions]

Which of the following is a PRIMARY objective of performing a privacy impact assessment (PIA) prior to onboarding a new Software as a Service (SaaS) provider for a customer relationship management (CRM) system?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Julie
4 months ago
I’m not sure about A, can we really identify all controls upfront?
upvoted 0 times
...
Alease
4 months ago
B is also important, but not primary in my opinion.
upvoted 0 times
...
Annamae
4 months ago
Surprised that D isn't the top choice, isn't that crucial?
upvoted 0 times
...
Aron
4 months ago
I think C is more important, assessing risk is key.
upvoted 0 times
...
Alaine
5 months ago
Definitely A, it's all about mitigating risks!
upvoted 0 times
...
Tyisha
5 months ago
I feel like determining the service provider's ability to maintain data protection controls is important, but is it the primary objective?
upvoted 0 times
...
Selma
5 months ago
I remember a practice question that focused on assessing risks associated with personal data usage. That seems relevant here too.
upvoted 0 times
...
Stefania
5 months ago
I think the primary objective is to identify controls to mitigate data privacy risks, but I'm not entirely sure.
upvoted 0 times
...
Craig
5 months ago
Classifying personal data according to the data classification scheme sounds like a secondary task, not the main goal of a PIA.
upvoted 0 times
...
Stephane
5 months ago
I remember learning about these different org structures in class. Based on the information provided, I think this is most likely a projectized structure, so I'll select option C.
upvoted 0 times
...
Detra
5 months ago
Hmm, I'm a little confused by this question. The underlined text doesn't seem to make sense to me, but I'm not sure which of the options is the correct term. I might need to review my notes on software development concepts to be sure I'm selecting the right answer.
upvoted 0 times
...
Eveline
5 months ago
I think the key here is that the exception shielding logic in Service A is not sufficient on its own. The question is implying that there's a gap in the security measures, and option C seems to be the best answer - we need to use the exception shielding logic together with encryption to truly prevent the spread of malicious content.
upvoted 0 times
...
Elizabeth
5 months ago
I'm a bit confused on the differences between the portal options. The question doesn't provide a lot of detail on the capabilities of each one. I'd want to do some more research on the features and limitations of each before making a decision. Maybe I'll mark this one and come back to it later if I have time.
upvoted 0 times
...
Cassie
5 months ago
I'm not sure about this one. The question seems a bit confusing, and I'm not familiar with the term "fishbone diagram."
upvoted 0 times
...
Stefany
5 months ago
I'm a bit confused by this question. Dropping the age feature entirely seems like it could lead to important information being lost. But the 0 values are definitely concerning. Maybe using a more advanced technique like k-means clustering could help handle the missing data in a more sophisticated way?
upvoted 0 times
...

Save Cancel