Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CIPT Certified Information Privacy Technologist Questions and Answers

Questions 4

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

Options:

A.

Encryption.

B.

Access Controls.

C.

De-identification.

D.

Multi-factor authentication.

Buy Now
Questions 5

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

Options:

A.

Individual participation.

B.

Purpose specification.

C.

Collection limitation.

D.

Accountability.

Buy Now
Questions 6

What is the most important requirement to fulfill when transferring data out of an organization?

Options:

A.

Ensuring the organization sending the data controls how the data is tagged by the receiver.

B.

Ensuring the organization receiving the data performs a privacy impact assessment.

C.

Ensuring the commitments made to the data owner are followed.

D.

Extending the data retention schedule as needed.

Buy Now
Questions 7

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

What type of principles would be the best guide for Jane's ideas regarding a new data management program?

Options:

A.

Collection limitation principles.

B.

Vendor management principles.

C.

Incident preparedness principles.

D.

Fair Information Practice Principles

Buy Now
Questions 8

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

How can Finley Motors reduce the risk associated with transferring Chuck’s personal information to AMP Payment Resources?

Options:

A.

By providing only the minimum necessary data to process the violation notice and masking all other information prior to transfer.

B.

By requesting AMP Payment Resources delete unnecessary datasets and only utilize what is necessary to process the violation notice.

C.

By obfuscating the minimum necessary data to process the violation notice and require AMP Payment Resources to secure store the personal information.

D.

By transferring all information to separate datafiles and requiring AMP Payment Resources to combine the datasets during processing of the violation notice.

Buy Now
Questions 9

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What should Finley Motors have done to incorporate the transparency principle of Privacy by Design (PbD)?

Options:

A.

Signed a data sharing agreement with AMP Payment Resources.

B.

Documented that Finley Motors has a legitimate interest to share Chuck’s information.

C.

Obtained verbal consent from Chuck and recorded it within internal systems.

D.

Provided notice of data sharing practices within the electronically signed rental agreement.

Buy Now
Questions 10

Which of the following methods does NOT contribute to keeping the data confidential?

Options:

A.

Differential privacy.

B.

Homomorphic encryption.

C.

K-anonymity.

D.

Referential integrity.

Buy Now
Questions 11

In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?

Options:

A.

The size of the data.

B.

The format of the data.

C.

The range of the data.

D.

The medium of the data.

Buy Now
Questions 12

Information classification helps an organization protect confidential and nonpublic information primarily because?

Options:

A.

It helps identify sensitive and critical information that require very strict safeguards.

B.

It falls under the security principles of confidentiality, integrity, and availability.

C.

It promotes employee accountability for safeguarding confidential information.

D.

It is legally required under most regulations.

Buy Now
Questions 13

Which activity would best support the principle of data quality?

Options:

A.

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.

Ensuring that the number of teams processing personal information is limited.

C.

Delivering information in a format that the data subject understands.

D.

Ensuring that information remains accurate.

Buy Now
Questions 14

Which of these actions is NOT generally part of the responsibility of an IT or software engineer?

Options:

A.

Providing feedback on privacy policies.

B.

Implementing multi-factor authentication.

C.

Certifying compliance with security and privacy law.

D.

Building privacy controls into the organization’s IT systems or software.

Buy Now
Questions 15

Which of the following is an example of drone “swarming”?

Options:

A.

A drone filming a cyclist from above as he rides.

B.

A drone flying over a building site to gather data.

C.

Drones delivering retailers’ packages to private homes.

D.

Drones communicating with each other to perform a search and rescue.

Buy Now
Questions 16

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

Options:

A.

Relationship of family member

B.

Phone number

C.

Dale of birth

D.

Citizenship

Buy Now
Questions 17

Under the Family Educational Rights and Privacy Act (FERPA), releasing personally identifiable information from a student's educational record requires written permission from the parent or eligible student in order for information to be?

Options:

A.

Released to a prospective employer.

B.

Released to schools to which a student is transferring.

C.

Released to specific individuals for audit or evaluation purposes.

D.

Released in response to a judicial order or lawfully ordered subpoena.

Buy Now
Questions 18

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

Regarding the app, which action is an example of a decisional interference violation?

Options:

A.

The app asks income level to determine the treatment of care.

B.

The app sells aggregated data to an advertising company without prior consent.

C.

The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.

D.

The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual’s symptoms.

Buy Now
Questions 19

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?

Options:

A.

The Personal Data Ordinance.

B.

The EU Data Protection Directive.

C.

The Code of Fair Information Practices.

D.

The Organization for Economic Co-operation and Development (OECD) Privacy Principles.

Buy Now
Questions 20

A key principle of an effective privacy policy is that it should be?

Options:

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Buy Now
Questions 21

A user who owns a resource wants to give other individuals access to the resource. What control would apply?

Options:

A.

Mandatory access control.

B.

Role-based access controls.

C.

Discretionary access control.

D.

Context of authority controls.

Buy Now
Questions 22

What is an Access Control List?

Options:

A.

A list of steps necessary for an individual to access a resource.

B.

A list that indicates the type of permission granted to each individual.

C.

A list showing the resources that an individual has permission to access.

D.

A list of individuals who have had their access privileges to a resource revoked.

Buy Now
Questions 23

A valid argument against data minimization is that it?

Options:

A.

Can limit business opportunities.

B.

Decreases the speed of data transfers.

C.

Can have an adverse effect on data quality.

D.

Increases the chance that someone can be identified from data.

Buy Now
Questions 24

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

Options:

A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Buy Now
Questions 25

A company seeking to hire engineers in Silicon Valley ran an ad campaign targeting women in a specific age range who live in the San Francisco Bay Area.

Which Calo objective privacy harm is likely to result from this campaign?

Options:

A.

Lost opportunity.

B.

Economic loss.

C.

Loss of liberty.

D.

Social detriment.

Buy Now
Questions 26

Which of the following modes of interaction often target both people who personally know and are strangers to the attacker?

Options:

A.

Spam.

B.

Phishing.

C.

Unsolicited sexual imagery.

D.

Consensually-shared sexual imagery.

Buy Now
Questions 27

Which of the following is the least effective privacy preserving practice in the Systems Development Life Cycle (SDLC)?

Options:

A.

Conducting privacy threat modeling for the use-case.

B.

Following secure and privacy coding standards in the development.

C.

Developing data flow modeling to identify sources and destinations of sensitive data.

D.

Reviewing the code against Open Web Application Security Project (OWASP) Top 10 Security Risks.

Buy Now
Questions 28

What is the potential advantage of homomorphic encryption?

Options:

A.

Encrypted information can be analyzed without decrypting it first.

B.

Ciphertext size decreases as the security level increases.

C.

It allows greater security and faster processing times.

D.

It makes data impenetrable to attacks.

Buy Now
Questions 29

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

Which regulator has jurisdiction over the shop's data management practices?

Options:

A.

The Federal Trade Commission.

B.

The Department of Commerce.

C.

The Data Protection Authority.

D.

The Federal Communications Commission.

Buy Now
Questions 30

Which is NOT a way to validate a person's identity?

Options:

A.

Swiping a smartcard into an electronic reader.

B.

Using a program that creates random passwords.

C.

Answering a question about "something you know”.

D.

Selecting a picture and tracing a unique pattern on it

Buy Now
Questions 31

What has been identified as a significant privacy concern with chatbots?

Options:

A.

Most chatbot providers do not agree to code audits

B.

Chatbots can easily verify the identity of the contact.

C.

Users’ conversations with chatbots are not encrypted in transit.

D.

Chatbot technology providers may be able to read chatbot conversations with users.

Buy Now
Questions 32

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

Options:

A.

Server driven controls.

B.

Cloud computing

C.

Data on demand

D.

MAC filtering

Buy Now
Questions 33

When releasing aggregates, what must be performed to magnitude data to ensure privacy?

Options:

A.

Value swapping.

B.

Noise addition.

C.

Basic rounding.

D.

Top coding.

Buy Now
Questions 34

To comply with the Sarbanes-Oxley Act (SOX), public companies in the United States are required to annually report on the effectiveness of the auditing controls of their financial reporting systems. These controls must be implemented to prevent unauthorized use, disclosure, modification, and damage or loss of financial data.

Why do these controls ensure both the privacy and security of data?

Options:

A.

Modification of data is an aspect of privacy; unauthorized use, disclosure, and damage or loss of data are aspects of security.

B.

Unauthorized use of data is an aspect of privacy; disclosure, modification, and damage or loss of data are aspects of security.

C.

Disclosure of data is an aspect of privacy; unauthorized use, modification, and damage or loss of data are aspects of security.

D.

Damage or loss of data are aspects of privacy; disclosure, unauthorized use, and modification of data are aspects of privacy.

Buy Now
Questions 35

Data oriented strategies Include which of the following?

Options:

A.

Minimize. Separate, Abstract, Hide.

B.

Inform, Control, Enforce, Demonstrate.

C.

Encryption, Hashing, Obfuscation, Randomization.

D.

Consent. Contract, Legal Obligation, Legitimate interests.

Buy Now
Questions 36

What tactic does pharming use to achieve its goal?

Options:

A.

It modifies the user's Hosts file.

B.

It encrypts files on a user's computer.

C.

It creates a false display advertisement.

D.

It generates a malicious instant message.

Buy Now
Questions 37

How does browser fingerprinting compromise privacy?

Options:

A.

By creating a security vulnerability.

B.

By differentiating users based upon parameters.

C.

By persuading users to provide personal information.

D.

By customizing advertising based on the geographic location.

Buy Now
Questions 38

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?

Options:

A.

Symmetric Encryption

B.

Tokenization

C.

Obfuscation

D.

Certificates

Buy Now
Questions 39

A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?

Options:

A.

Explicit.

B.

Implicit.

C.

Specific

D.

Valid.

Buy Now
Questions 40

Which of the following is NOT relevant to a user exercising their data portability rights?

Options:

A.

Notice and consent for the downloading of data.

B.

Detection of phishing attacks against the portability interface.

C.

Re-authentication of an account, including two-factor authentication as appropriate.

D.

Validation of users with unauthenticated identifiers (e.g. IP address, physical address).

Buy Now
Questions 41

A credit card with the last few numbers visible is an example of what?

Options:

A.

Masking data

B.

Synthetic data

C.

Sighting controls.

D.

Partial encryption

Buy Now
Questions 42

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

What measures can protect client information stored at GFDC?

Options:

A.

De-linking of data into client-specific packets.

B.

Cloud-based applications.

C.

Server-side controls.

D.

Data pruning

Buy Now
Questions 43

Which of the following is NOT a valid basis for data retention?

Options:

A.

Size of the data.

B.

Type of the data.

C.

Location of the data.

D.

Last time the data was accessed.

Buy Now
Questions 44

A company configures their information system to have the following capabilities:

Allow for selective disclosure of attributes to certain parties, but not to others.

Permit the sharing of attribute references instead of attribute values - such as “I am over 21” instead of birthday date.

Allow for information to be altered or deleted as needed.

These capabilities help to achieve which privacy engineering objective?

Options:

A.

Predictability.

B.

Manageability.

C.

Disassociability.

D.

Integrity.

Buy Now
Questions 45

What must be used in conjunction with disk encryption?

Options:

A.

Increased CPU speed.

B.

A strong password.

C.

A digital signature.

D.

Export controls.

Buy Now
Questions 46

What is the goal of privacy enhancing technologies (PETS) like multiparty computation and differential privacy?

Options:

A.

To facilitate audits of third party vendors.

B.

To protect sensitive data while maintaining its utility.

C.

To standardize privacy activities across organizational groups.

D.

To protect the security perimeter and the data items themselves.

Buy Now
Questions 47

Which of the following entities would most likely be exempt from complying with the General Data Protection Regulation (GDPR)?

Options:

A.

A South American company that regularly collects European customers’ personal data.

B.

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.

C.

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.

D.

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.

Buy Now
Questions 48

What is the main function of a breach response center?

Options:

A.

Detecting internal security attacks.

B.

Addressing privacy incidents.

C.

Providing training to internal constituencies.

D.

Interfacing with privacy regulators and governmental bodies.

Buy Now
Questions 49

Which of the following functionalities can meet some of the General Data Protection Regulation’s (GDPR’s) Data Portability requirements for a social networking app designed for users in the EU?

Options:

A.

Allow users to modify the data they provided the app.

B.

Allow users to delete the content they provided the app.

C.

Allow users to download the content they have provided the app.

D.

Allow users to get a time-stamped list of what they have provided the app.

Buy Now
Questions 50

Which Privacy by Design principle requires architects and operators to emphasize the interests of the individual by offering measures such as strong privacy defaults, appropriate

notice, and user-friendly options?

Options:

A.

Data lifecycle protection.

B.

Embedded into design.

C.

Respect for user privacy.

D.

Proactive not reactive.

Buy Now
Questions 51

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

Options:

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Buy Now
Questions 52

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

Why would you recommend that GFC use record encryption rather than disk, file or table encryption?

Options:

A.

Record encryption is asymmetric, a stronger control measure.

B.

Record encryption is granular, limiting the damage of potential breaches.

C.

Record encryption involves tag masking, so its metadata cannot be decrypted

D.

Record encryption allows for encryption of personal data only.

Buy Now
Questions 53

A clinical research organization is processing highly sensitive personal data, including numerical attributes, from medical trial results. The organization needs to manipulate the data without revealing the contents to data users. This can be achieved by utilizing?

Options:

A.

k-anonymity.

B.

Microdata sets.

C.

Polymorphic encryption.

D.

Homomorphic encryption.

Buy Now
Questions 54

What is the best way to protect privacy on a geographic information system (GIS)?

Options:

A.

Limiting the data provided to the system.

B.

Using a wireless encryption protocol.

C.

Scrambling location information.

D.

Using a firewall.

Buy Now
Questions 55

An organization is evaluating a number of Machine Learning (ML) solutions to help automate a customer-facing part of its business From a privacy perspective, the organization should first?

Options:

A.

Define their goals for fairness

B.

Document the distribution of bias scores

C.

Document the False Positive Rates (FPR).

D.

Define how data subjects may object to the processing

Buy Now
Questions 56

Not updating software for a system that processes human resources data with the latest security patches may create what?

Options:

A.

Authentication issues.

B.

Privacy vulnerabilities.

C.

Privacy threat vectors.

D.

Reportable privacy violations.

Buy Now
Questions 57

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

Options:

A.

The data and recipients for medical research are not specified

B.

Insufficient information is provided on notifications and infection alerts

C.

The sharing of information with an affiliated healthcare provider is too risky

D.

Allowing users to share risk result information for exposure and contact tracing purposes

Buy Now
Questions 58

An EU marketing company is planning to make use of personal data captured to make automated decisions based on profiling. In some cases, processing and automated decisions may have a legal effect on individuals, such as credit worthiness.

When evaluating the implementation of systems making automated decisions, in which situation would the company have to accommodate an individual’s right NOT to be subject to such processing to ensure compliance under the General Data Protection Regulation (GDPR)?

Options:

A.

When an individual’s legal status or rights are not affected by the decision.

B.

When there is no human intervention or influence in the decision-making process.

C.

When the individual has given explicit consent to such processing and suitable safeguards exist.

D.

When the decision is necessary for entering into a contract and the individual can contest the decision.

Buy Now
Questions 59

Which of the following are the mandatory pieces of information to be included in the documentation of records of processing activities for an organization that processes personal data on behalf of another organization?

Options:

A.

Copies of the consent forms from each data subject.

B.

Time limits for erasure of different categories of data.

C.

Contact details of the processor and Data Protection Offer (DPO).

D.

Descriptions of the processing activities and relevant data subjects.

Buy Now
Questions 60

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

Which should be used to allow the home sales force to accept payments using smartphones?

Options:

A.

Field transfer protocol.

B.

Cross-current translation.

C.

Near-field communication

D.

Radio Frequency Identification

Buy Now
Questions 61

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

The app is designed to collect and transmit geolocation data. How can data collection best be limited to the necessary minimum?

Options:

A.

Allow user to opt-out geolocation data collection at any time.

B.

Allow access and sharing of geolocation data only after an accident occurs.

C.

Present a clear and explicit explanation about need for the geolocation data.

D.

Obtain consent and capture geolocation data at all times after consent is received.

Buy Now
Questions 62

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?

Options:

A.

Verify that WebTracker's HR and Payroll systems implement the current privacy notice (after the typos are fixed).

B.

Review the list of subcontractors employed by AmaZure and ensure these are included in the formal agreement with WebTracker.

C.

Evaluate and review the basis for processing employees’ personal data in the context of the prototype created by WebTracker and approved by the CEO.

D.

Confirm whether the data transfer from London to the USA has been fully approved by AmaZure and the appropriate institutions in the USA and the European Union.

Buy Now
Questions 63

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?

Options:

A.

Cloud file transfer services.

B.

Certificate Authority (CA).

C.

HyperText Transfer Protocol (HTTP).

D.

Transport Layer Security (TLS).

Buy Now
Questions 64

Which activity should the privacy technologist undertake to reduce potential privacy risk when evaluating options to process data in a country other than where it would be collected? ^

Options:

A.

Review the Data Life Cycle.

B.

Review data retention policies.

C.

Create enterprise data flow diagrams.

D.

Recommend controls for data transfers.

Buy Now
Questions 65

An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls.

Before implementation, a privacy technologist should conduct which of the following?

Options:

A.

A Data Protection Impact Assessment (DPIA) and consultation with the appropriate regulator to ensure legal compliance.

B.

A privacy risk and impact assessment to evaluate potential risks from the proposed processing operations.

C.

A Legitimate Interest Assessment (LIA) to ensure that the processing is proportionate and does not override the privacy, rights and freedoms of the customers.

D.

A security assessment of the help desk solution and provider to assess if the technology was developed with a security by design approach.

Buy Now
Questions 66

A BaaS provider backs up the corporate data and stores it in an outsider provider under contract with the organization. A researcher notifies the organization that he found unsecured data in the cloud. The organization looked into the issue and realized $ne of its backups was misconfigured on the outside provider's cloud and the data fully exposed to the open internet. They quickly secured the backup. Which is the best next step the organization should take?

Options:

A.

Review the content of the data exposed.

B.

Review its contract with the outside provider.

C.

Investigate how the researcher discovered the unsecured data.

D.

Investigate using alternate BaaS providers or on-premise backup systems.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist
Last Update: Nov 23, 2024
Questions: 220
CIPT pdf

CIPT PDF

$25.5  $84.99
CIPT Engine

CIPT Testing Engine

$30  $99.99
CIPT PDF + Engine

CIPT PDF + Testing Engine

$40.5  $134.99