Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CIPT Certified Information Privacy Technologist Questions and Answers

Questions 4

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

Which should be used to allow the home sales force to accept payments using smartphones?

Options:

A.

Field transfer protocol.

B.

Cross-current translation.

C.

Near-field communication

D.

Radio Frequency Identification

Buy Now
Questions 5

An organization is using new technologies that will target and process personal data of EU customers. In which of the following circumstances would a privacy technologist need to support a data protection impact assessment (DPIA)?

Options:

A.

If a privacy notice and opt-m consent box are not displayed to the individual

B.

If security of data processing has not been evaluated

C.

If a large amount of personal data will be collected.

D.

If data processing is a high risk to an individual's rights and freedoms

Buy Now
Questions 6

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

Options:

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Buy Now
Questions 7

An organization is launching a new smart speaker to the market. The device will have the capability to play music and provide news and weather updates. Which of the following would be a concern from a privacy perspective?

Options:

A.

Appropriation.

B.

Browser Fingerprinting.

C.

Context of authority.

D.

Context aware computing.

Buy Now
Questions 8

Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India. The Aadhaar database contains the Aadhaar number, name, date of birth, gender and address of over 1 billion individuals.

Which of the following datasets derived from that data would be considered the most de-identified?

Options:

A.

A count of the years of birth and hash of the person’ s gender.

B.

A count of the month of birth and hash of the person's first name.

C.

A count of the day of birth and hash of the person’s first initial of their first name.

D.

Account of the century of birth and hash of the last 3 digits of the person's Aadhaar number.

Buy Now
Questions 9

Why is first-party web tracking very difficult to prevent?

Options:

A.

The available tools to block tracking would break most sites’ functionality.

B.

Consumers enjoy the many benefits they receive from targeted advertising.

C.

Regulatory frameworks are not concerned with web tracking.

D.

Most browsers do not support automatic blocking.

Buy Now
Questions 10

What is the goal of privacy enhancing technologies (PETS) like multiparty computation and differential privacy?

Options:

A.

To facilitate audits of third party vendors.

B.

To protect sensitive data while maintaining its utility.

C.

To standardize privacy activities across organizational groups.

D.

To protect the security perimeter and the data items themselves.

Buy Now
Questions 11

In day to day interactions with technology, consumers are presented with privacy choices. Which of the following best represents the Privacy by Design (PbD) methodology of letting the user choose a non-zero-sum choice?

Options:

A.

Using images, words, and contexts to elicit positive feelings that result in proactive behavior, thus eliminating negativity and biases.

B.

Providing plain-language design choices that elicit privacy-related responses, helping users avoid errors and minimize the negative consequences of errors when they do occur.

C.

Displaying the percentage of users that chose a particular option, thus enabling the user to choose the most preferred option.

D.

Using contexts, antecedent events, and other priming concepts to assist the user in making a better privacy choice.

Buy Now
Questions 12

What is true of providers of wireless technology?

Options:

A.

They have the legal right in most countries to control and use any data on their systems.

B.

They can see all unencrypted data that crosses the system.

C.

They are typically exempt from data security regulations.

D.

They routinely backup data that crosses their system.

Buy Now
Questions 13

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

RFID can be utilized to track people or consumer products

B.

RFID can be utilized to gam unauthorized access to an individual's device

C.

RFID can be utilized to spoof identification details

D.

RFID can be utilized to read information from a device without the user's knowledge

Buy Now
Questions 14

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?

Options:

A.

Limited-retention, de-identified logs including only metadata.

B.

Limited-retention, de-identified logs including the links clicked in messages as well as metadata.

C.

Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.

D.

Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.

Buy Now
Questions 15

Which of the following is a stage in the data life cycle?

Options:

A.

Data classification.

B.

Data inventory.

C.

Data masking.

D.

Data retention.

Buy Now
Questions 16

Ivan is a nurse for a home healthcare service provider in the US. The company has implemented a mobile application which Ivan uses to record a patient's vital statistics and access a patient's health care records during home visits. During one visitj^van is unable to access the health care application to record the patient's vitals. He instead records the information on his mobile phone's note-taking application to enter the data in the health care application the next time it is accessible. What would be the best course of action by the IT department to ensure the data is protected on his device?

Options:

A.

Provide all healthcare employees with mandatory annual security awareness training with a focus on the health

information protection.

B.

Complete a SWOT analysis exercise on the mobile application to identify what caused the application to be

inaccessible and remediate any issues.

C.

Adopt mobile platform standards to ensure that only mobile devices that support encryption capabilities are used.

D.

Implement Mobile Device Management (MDM) to enforce company security policies and configuration settings.

Buy Now
Questions 17

Granting data subjects the right to have data corrected, amended, or deleted describes?

Options:

A.

Use limitation.

B.

Accountability.

C.

A security safeguard

D.

Individual participation

Buy Now
Questions 18

What term describes two re-identifiable data sets that both come from the same unidentified individual?

Options:

A.

Pseudonymous data.

B.

Anonymous data.

C.

Aggregated data.

D.

Imprecise data.

Buy Now
Questions 19

A company seeking to hire engineers in Silicon Valley ran an ad campaign targeting women in a specific age range who live in the San Francisco Bay Area.

Which Calo objective privacy harm is likely to result from this campaign?

Options:

A.

Lost opportunity.

B.

Economic loss.

C.

Loss of liberty.

D.

Social detriment.

Buy Now
Questions 20

Which of the following is the least effective privacy preserving practice in the Systems Development Life Cycle (SDLC)?

Options:

A.

Conducting privacy threat modeling for the use-case.

B.

Following secure and privacy coding standards in the development.

C.

Developing data flow modeling to identify sources and destinations of sensitive data.

D.

Reviewing the code against Open Web Application Security Project (OWASP) Top 10 Security Risks.

Buy Now
Questions 21

A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?

Options:

A.

Geofencing

B.

Geo-tracking

C.

Geo-tagging

D.

Geolocation

Buy Now
Questions 22

Which of these is considered an ethical dark pattern on privacy?

Options:

A.

Using attractive designs to influence an individual.

B.

Rewarding users for providing more personal information

C.

Giving users more privacy options in relation to their personal information

D.

Providing dear and simple privacy notices to users

Buy Now
Questions 23

Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?

Options:

A.

Express consent.

B.

Implied consent.

C.

Informed notice.

D.

Authorized notice.

Buy Now
Questions 24

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?

Options:

A.

Unseen web beacons that combine information on multiple users.

B.

Latent keys that trigger malware when an advertisement is selected.

C.

Personal information collected by cookies linked to the advertising network.

D.

Sensitive information from Structured Query Language (SQL) commands that may be exposed.

Buy Now
Questions 25

After committing to a Privacy by Design program, which activity should take place first?

Options:

A.

Create a privacy standard that applies to all projects and services.

B.

Establish a retention policy for all data being collected.

C.

Implement easy to use privacy settings for users.

D.

Perform privacy reviews on new projects.

Buy Now
Questions 26

What is the term for information provided to a social network by a member?

Options:

A.

Profile data.

B.

Declared data.

C.

Personal choice data.

D.

Identifier information.

Buy Now
Questions 27

What is the main benefit of using dummy data during software testing?

Options:

A.

The data comes in a format convenient for testing.

B.

Statistical disclosure controls are applied to the data.

C.

The data enables the suppression of particular values in a set.

D.

Developers do not need special privacy training to test the software.

Buy Now
Questions 28

Which of the following is NOT a workplace surveillance best practice?

Options:

A.

Check local privacy laws before putting surveillance in place.

B.

Ensure surveillance is discreet so employees do not alter their behavior.

C.

Once surveillance data has been gathered, limit exposure of the content.

D.

Ensure the minimal amount of surveillance is performed to meet the objective.

Buy Now
Questions 29

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

Options:

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Buy Now
Questions 30

Which of the following most embodies the principle of Data Protection by Default?

Options:

A.

A messaging app for high school students that uses HTTPS to communicate with the server.

B.

An electronic teddy bear with built-in voice recognition that only responds to its owner's voice.

C.

An internet forum for victims of domestic violence that allows anonymous posts without registration.

D.

A website that has an opt-in form for marketing emails when registering to download a whitepaper.

Buy Now
Questions 31

Which of the following are the mandatory pieces of information to be included in the documentation of records of processing activities for an organization that processes personal data on behalf of another organization?

Options:

A.

Copies of the consent forms from each data subject.

B.

Time limits for erasure of different categories of data.

C.

Contact details of the processor and Data Protection Offer (DPO).

D.

Descriptions of the processing activities and relevant data subjects.

Buy Now
Questions 32

An organization is launching a smart watch which, in addition to alerts, will notify the the wearer of incoming calls allowing them to answer on the device. This convenience also comes with privacy concerns and is an example of?

Options:

A.

Value-Sensitive Design.

B.

Ubiquitous computing.

C.

Anthropomorphism.

D.

Coupling

Buy Now
Questions 33

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:

A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Buy Now
Questions 34

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which regulation most likely applies to the data stored by Berry Country Regional Medical Center?

Options:

A.

Personal Information Protection and Electronic Documents Act

B.

Health Insurance Portability and Accountability Act

C.

The Health Records Act 2001

D.

The European Union Directive 95/46/EC

Buy Now
Questions 35

A jurisdiction requiring an organization to place a link on the website that allows a consumer to opt-out of sharing is an example of what type of requirement?

Options:

A.

Functional

B.

Operational

C.

Technical

D.

Use case

Buy Now
Questions 36

What is the most important requirement to fulfill when transferring data out of an organization?

Options:

A.

Ensuring the organization sending the data controls how the data is tagged by the receiver.

B.

Ensuring the organization receiving the data performs a privacy impact assessment.

C.

Ensuring the commitments made to the data owner are followed.

D.

Extending the data retention schedule as needed.

Buy Now
Questions 37

A credit card with the last few numbers visible is an example of what?

Options:

A.

Masking data

B.

Synthetic data

C.

Sighting controls.

D.

Partial encryption

Buy Now
Questions 38

A privacy technologist has been asked to aid in a forensic investigation on the darknet following the compromise of a company's personal data. This will primarily involve an understanding of which of the following privacy-preserving techniques?

Options:

A.

Encryption

B.

Do Not Track

C.

Masking

D.

Tokenization

Buy Now
Questions 39

Which activity would best support the principle of data quality?

Options:

A.

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.

Ensuring that the number of teams processing personal information is limited.

C.

Delivering information in a format that the data subject understands.

D.

Ensuring that information remains accurate.

Buy Now
Questions 40

Information classification helps an organization protect confidential and nonpublic information primarily because?

Options:

A.

It helps identify sensitive and critical information that require very strict safeguards.

B.

It falls under the security principles of confidentiality, integrity, and availability.

C.

It promotes employee accountability for safeguarding confidential information.

D.

It is legally required under most regulations.

Buy Now
Questions 41

What is the best way to protect privacy on a geographic information system (GIS)?

Options:

A.

Limiting the data provided to the system.

B.

Using a wireless encryption protocol.

C.

Scrambling location information.

D.

Using a firewall.

Buy Now
Questions 42

Which of the following best describes the basic concept of "Privacy by Design?"

Options:

A.

The adoption of privacy enhancing technologies.

B.

The integration of a privacy program with all lines of business.

C.

The implementation of privacy protection through system architecture.

D.

The introduction of business process to identify and assess privacy gaps.

Buy Now
Questions 43

What element is most conducive to fostering a sound privacy by design culture in an organization?

Options:

A.

Ensuring all employees acknowledge and understood the privacy policy.

B.

Frequent privacy and security awareness training for employees.

C.

Monthly reviews of organizational privacy principles.

D.

Gaining advocacy from senior management.

Buy Now
Questions 44

All of the following topics should be included in a workplace surveillance policy EXCEPT?

Options:

A.

Who can be tracked and when.

B.

Who can access surveillance data.

C.

What areas can be placed under surveillance.

D.

Who benefits from collecting surveillance data.

Buy Now
Questions 45

SCENARIO

Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick and Harry are veteran senior information privacy and security professionals at their respective companies, and continue to lead the east and west divisions of New Company. The purpose of the meeting was to conduct a SWOT (strengths/weaknesses/opportunities/threats) analysis for New Company. Their SWOT analysis conclusions are summarized below.

Dick was enthusiastic about an opportunity for the New Company to reduce costs and increase computing power and flexibility through cloud services. East Company had been contemplating moving to the cloud, but West Company already had a vendor that was providing it with software-as-a-service (SaaS). Dick was looking forward to extending this service to the eastern region. Harry noted that this was a threat as well, because West Company had to rely on the third party to protect its data.

Tom mentioned that neither of the legacy companies had sufficient data storage space to meet the projected growth of New Company, which he saw as a weakness. Tom stated that one of the team's first projects would be to construct a consolidated New Company data warehouse. Tom would personally lead this project and would be held accountable if information was modified during transmission to or during storage in the new data warehouse.

Tom, Dick and Harry agreed that employee network access could be considered both a strength and a weakness. East Company and West Company had strong performance records in this regard; both had robust network access controls that were working as designed. However, during a projected year-long transition period, New Company employees would need to be able to connect to a New Company network while retaining access to the East Company and West Company networks.

When employees are working remotely, they usually connect to a Wi-Fi network. What should Harry advise for maintaining company security in this situation?

Options:

A.

Hiding wireless service set identifiers (SSID).

B.

Retaining the password assigned by the network.

C.

Employing Wired Equivalent Privacy (WEP) encryption.

D.

Using tokens sent through HTTP sites to verify user identity.

Buy Now
Questions 46

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

What would be the best way to supervise the third-party systems the EnsureClaim App will share data with?

Options:

A.

Review the privacy notices for each third-party that the app will share personal data with to determine adequate privacy and data protection controls are in place.

B.

Conduct a security and privacy review before onboarding new vendors that collect personal data from the app.

C.

Anonymize all personal data collected by the app before sharing any data with third-parties.

D.

Develop policies and procedures that outline how data is shared with third-party apps.

Buy Now
Questions 47

Which of the following statements best describes the relationship between privacy and security?

Options:

A.

Security systems can be used to enforce compliance with privacy policies.

B.

Privacy and security are independent; organizations must decide which should by emphasized.

C.

Privacy restricts access to personal information; security regulates how information should be used.

D.

Privacy protects data from being viewed during collection and security governs how collected data should be shared.

Buy Now
Questions 48

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

Options:

A.

The data and recipients for medical research are not specified

B.

Insufficient information is provided on notifications and infection alerts

C.

The sharing of information with an affiliated healthcare provider is too risky

D.

Allowing users to share risk result information for exposure and contact tracing purposes

Buy Now
Questions 49

UESTION NO: 48

Which is NOT a drawback to using a biometric recognition system?

Options:

A.

It can require more maintenance and support.

B.

It can be more expensive than other systems

C.

It has limited compatibility across systems.

D.

It is difficult for people to use.

Buy Now
Questions 50

Which of the following is considered a records management best practice?

Options:

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Buy Now
Questions 51

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

CIPT Question 51

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?

Options:

A.

Nothing at this stage as the Managing Director has made a decision.

B.

Determine if any Clean-Q competitors currently use LeadOps as a solution.

C.

Obtain a legal opinion from an external law firm on contracts management.

D.

Involve the Information Security team to understand in more detail the types of services and solutions LeadOps is proposing.

Buy Now
Questions 52

An EU marketing company is planning to make use of personal data captured to make automated decisions based on profiling. In some cases, processing and automated decisions may have a legal effect on individuals, such as credit worthiness.

When evaluating the implementation of systems making automated decisions, in which situation would the company have to accommodate an individual’s right NOT to be subject to such processing to ensure compliance under the General Data Protection Regulation (GDPR)?

Options:

A.

When an individual’s legal status or rights are not affected by the decision.

B.

When there is no human intervention or influence in the decision-making process.

C.

When the individual has given explicit consent to such processing and suitable safeguards exist.

D.

When the decision is necessary for entering into a contract and the individual can contest the decision.

Buy Now
Questions 53

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?

Options:

A.

Symmetric Encryption

B.

Tokenization

C.

Obfuscation

D.

Certificates

Buy Now
Questions 54

An organization's customers have suffered a number of data breaches through successful social engineering attacks. One potential solution to remediate and prevent future occurrences would be to implement which of the following?

Options:

A.

Differential identifiability.

B.

Multi-factor authentication.

C.

Greater password complexity.

D.

Attribute-based access control.

Buy Now
Questions 55

What tactic does pharming use to achieve its goal?

Options:

A.

It modifies the user's Hosts file.

B.

It encrypts files on a user's computer.

C.

It creates a false display advertisement.

D.

It generates a malicious instant message.

Buy Now
Questions 56

How does browser fingerprinting compromise privacy?

Options:

A.

By creating a security vulnerability.

B.

By differentiating users based upon parameters.

C.

By persuading users to provide personal information.

D.

By customizing advertising based on the geographic location.

Buy Now
Questions 57

Which of the following activities would be considered the best method for an organization to achieve the privacy principle of data quality'?

Options:

A.

Clash customer information with information from a data broker

B.

Build a system with user access controls and approval workflows to edit customer data

C.

Set a privacy notice covering the purpose for collection of a customer's data

D.

Provide a customer with a copy of their data in a machine-readable format

Buy Now
Questions 58

Organizations understand there are aggregation risks associated with the way the process their customer’s data. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

Options:

A.

Risk transfer.

B.

Risk mitigation.

C.

Risk avoidance.

D.

Risk acceptance.

Buy Now
Questions 59

Which is the most accurate type of biometrics?

Options:

A.

DNA

B.

Voiceprint.

C.

Fingerprint.

D.

Facial recognition.

Buy Now
Questions 60

When writing security policies, the most important consideration is to?

Options:

A.

Require all employees to read and acknowledge their understanding.

B.

Ensure they are based on the organization's risk profile.

C.

Ensure they cover enough details for common situations.

D.

Follow industry best practices.

Buy Now
Questions 61

To comply with the Sarbanes-Oxley Act (SOX), public companies in the United States are required to annually report on the effectiveness of the auditing controls of their financial reporting systems. These controls must be implemented to prevent unauthorized use, disclosure, modification, and damage or loss of financial data.

Why do these controls ensure both the privacy and security of data?

Options:

A.

Modification of data is an aspect of privacy; unauthorized use, disclosure, and damage or loss of data are aspects of security.

B.

Unauthorized use of data is an aspect of privacy; disclosure, modification, and damage or loss of data are aspects of security.

C.

Disclosure of data is an aspect of privacy; unauthorized use, modification, and damage or loss of data are aspects of security.

D.

Damage or loss of data are aspects of privacy; disclosure, unauthorized use, and modification of data are aspects of privacy.

Buy Now
Questions 62

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?

Options:

A.

The implied consent model provides the user with more detailed data collection information.

B.

To secure explicit consent, a user's website browsing would be significantly disrupted.

C.

An explicit consent model is more expensive to implement.

D.

Regulators prefer the implied consent model.

Buy Now
Questions 63

Which is NOT a way to validate a person's identity?

Options:

A.

Swiping a smartcard into an electronic reader.

B.

Using a program that creates random passwords.

C.

Answering a question about "something you know”.

D.

Selecting a picture and tracing a unique pattern on it

Buy Now
Questions 64

Value sensitive design focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Buy Now
Questions 65

A company configures their information system to have the following capabilities:

Allow for selective disclosure of attributes to certain parties, but not to others.

Permit the sharing of attribute references instead of attribute values - such as “I am over 21” instead of birthday date.

Allow for information to be altered or deleted as needed.

These capabilities help to achieve which privacy engineering objective?

Options:

A.

Predictability.

B.

Manageability.

C.

Disassociability.

D.

Integrity.

Buy Now
Questions 66

What is the distinguishing feature of asymmetric encryption?

Options:

A.

It has a stronger key for encryption than for decryption.

B.

It employs layered encryption using dissimilar methods.

C.

It uses distinct keys for encryption and decryption.

D.

It is designed to cross operating systems.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist
Last Update: Nov 17, 2024
Questions: 220

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now CIPT testing engine

PDF (Q&A)

$31.5  $104.99
buy now CIPT pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 24 Nov 2024