Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CIPT Certified Information Privacy Technologist Questions and Answers

Questions 4

Data oriented strategies Include which of the following?

Options:

A.

Minimize. Separate, Abstract, Hide.

B.

Inform, Control, Enforce, Demonstrate.

C.

Encryption, Hashing, Obfuscation, Randomization.

D.

Consent. Contract, Legal Obligation, Legitimate interests.

Buy Now
Questions 5

SCENARIO

Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick and Harry are veteran senior information privacy and security professionals at their respective companies, and continue to lead the east and west divisions of New Company. The purpose of the meeting was to conduct a SWOT (strengths/weaknesses/opportunities/threats) analysis for New Company. Their SWOT analysis conclusions are summarized below.

Dick was enthusiastic about an opportunity for the New Company to reduce costs and increase computing power and flexibility through cloud services. East Company had been contemplating moving to the cloud, but West Company already had a vendor that was providing it with software-as-a-service (SaaS). Dick was looking forward to extending this service to the eastern region. Harry noted that this was a threat as well, because West Company had to rely on the third party to protect its data.

Tom mentioned that neither of the legacy companies had sufficient data storage space to meet the projected growth of New Company, which he saw as a weakness. Tom stated that one of the team's first projects would be to construct a consolidated New Company data warehouse. Tom would personally lead this project and would be held accountable if information was modified during transmission to or during storage in the new data warehouse.

Tom, Dick and Harry agreed that employee network access could be considered both a strength and a weakness. East Company and West Company had strong performance records in this regard; both had robust network access controls that were working as designed. However, during a projected year-long transition period, New Company employees would need to be able to connect to a New Company network while retaining access to the East Company and West Company networks.

When employees are working remotely, they usually connect to a Wi-Fi network. What should Harry advise for maintaining company security in this situation?

Options:

A.

Hiding wireless service set identifiers (SSID).

B.

Retaining the password assigned by the network.

C.

Employing Wired Equivalent Privacy (WEP) encryption.

D.

Using tokens sent through HTTP sites to verify user identity.

Buy Now
Questions 6

What term describes two re-identifiable data sets that both come from the same unidentified individual?

Options:

A.

Pseudonymous data.

B.

Anonymous data.

C.

Aggregated data.

D.

Imprecise data.

Buy Now
Questions 7

Which of the following is the best method to minimize tracking through the use of cookies?

Options:

A.

Use ‘private browsing’ mode and delete checked files, clear cookies and cache once a day.

B.

Install a commercially available third-party application on top of the browser that is already installed.

C.

Install and use a web browser that is advertised as ‘built specifically to safeguard user privacy’.

D.

Manage settings in the browser to limit the use of cookies and remove them once the session completes.

Buy Now
Questions 8

Which is likely to reduce the types of access controls needed within an organization?

Options:

A.

Decentralization of data.

B.

Regular data inventories.

C.

Standardization of technology.

D.

Increased number of remote employees.

Buy Now
Questions 9

What is the main benefit of using dummy data during software testing?

Options:

A.

The data comes in a format convenient for testing.

B.

Statistical disclosure controls are applied to the data.

C.

The data enables the suppression of particular values in a set.

D.

Developers do not need special privacy training to test the software.

Buy Now
Questions 10

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

Which should be used to allow the home sales force to accept payments using smartphones?

Options:

A.

Field transfer protocol.

B.

Cross-current translation.

C.

Near-field communication

D.

Radio Frequency Identification

Buy Now
Questions 11

An organization is launching a smart watch which, in addition to alerts, will notify the the wearer of incoming calls allowing them to answer on the device. This convenience also comes with privacy concerns and is an example of?

Options:

A.

Value-Sensitive Design.

B.

Ubiquitous computing.

C.

Anthropomorphism.

D.

Coupling

Buy Now
Questions 12

What is typically NOT performed by sophisticated Access Management (AM) techniques?

Options:

A.

Restricting access to data based on location.

B.

Restricting access to data based on user role.

C.

Preventing certain types of devices from accessing data.

D.

Preventing data from being placed in unprotected storage.

Buy Now
Questions 13

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

What type of principles would be the best guide for Jane's ideas regarding a new data management program?

Options:

A.

Collection limitation principles.

B.

Vendor management principles.

C.

Incident preparedness principles.

D.

Fair Information Practice Principles

Buy Now
Questions 14

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?

Options:

A.

Symmetric Encryption

B.

Tokenization

C.

Obfuscation

D.

Certificates

Buy Now
Questions 15

An individual drives to the grocery store for dinner. When she arrives at the store, she receives several unsolicited notifications on

her phone about discounts on items at the grocery store she is about to shop at. Which type of privacy problem does the represent?

Options:

A.

Intrusion.

B.

Surveillance.

C.

Decisional Interference.

D.

Exposure.

Buy Now
Questions 16

A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?

Options:

A.

Geofencing

B.

Geo-tracking

C.

Geo-tagging

D.

Geolocation

Buy Now
Questions 17

A company configures their information system to have the following capabilities:

Allow for selective disclosure of attributes to certain parties, but not to others.

Permit the sharing of attribute references instead of attribute values - such as “I am over 21” instead of birthday date.

Allow for information to be altered or deleted as needed.

These capabilities help to achieve which privacy engineering objective?

Options:

A.

Predictability.

B.

Manageability.

C.

Disassociability.

D.

Integrity.

Buy Now
Questions 18

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the strongest method for authenticating Chuck’s identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

Options:

A.

By requiring Chuck use the last 4 digits of his driver’s license number in combination with a unique PIN provided within the violation notice.

B.

By requiring Chuck use his credit card number in combination with the last 4 digits of his driver’s license.

C.

By requiring Chuck use the rental agreement number in combination with his email address.

D.

By requiring Chuck to call AMP Payment Resources directly and provide his date of birth and home address.

Buy Now
Questions 19

An organization is using new technologies that will target and process personal data of EU customers. In which of the following circumstances would a privacy technologist need to support a data protection impact assessment (DPIA)?

Options:

A.

If a privacy notice and opt-m consent box are not displayed to the individual

B.

If security of data processing has not been evaluated

C.

If a large amount of personal data will be collected.

D.

If data processing is a high risk to an individual's rights and freedoms

Buy Now
Questions 20

What is a mistake organizations make when establishing privacy settings during the development of applications?

Options:

A.

Providing a user with too many choices.

B.

Failing to use "Do Not Track” technology.

C.

Providing a user with too much third-party information.

D.

Failing to get explicit consent from a user on the use of cookies.

Buy Now
Questions 21

What risk is mitigated when routing meeting video traffic through a company’s application servers rather than sending the video traffic directly from one user to another?

Options:

A.

The user's identity is protected from the other user

B.

The user is protected against cyberstalking attacks

C.

The user's IP address is hidden from the other user

D.

The user is assured that stronger authentication methods have been used

Buy Now
Questions 22

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system?

Options:

A.

Asymmetric Encryption

B.

Symmetric Encryption

C.

Obfuscation

D.

Hashing

Buy Now
Questions 23

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

An individual with an RFID receiver can track people or consumer products.

B.

An individual can scramble computer transmissions in weapons systems.

C.

An individual can use an RFID receiver to engage in video surveillance.

D.

An individual can tap mobile phone communications.

Buy Now
Questions 24

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which regulation most likely applies to the data stored by Berry Country Regional Medical Center?

Options:

A.

Personal Information Protection and Electronic Documents Act

B.

Health Insurance Portability and Accountability Act

C.

The Health Records Act 2001

D.

The European Union Directive 95/46/EC

Buy Now
Questions 25

What is the main function of a breach response center?

Options:

A.

Detecting internal security attacks.

B.

Addressing privacy incidents.

C.

Providing training to internal constituencies.

D.

Interfacing with privacy regulators and governmental bodies.

Buy Now
Questions 26

An organization is considering launching enhancements to improve security and authentication mechanisms in their products. To better identify the user and reduce friction from the authentication process, they plan to track physical attributes of an individual. A privacy technologist assessing privacy implications would be most interested in which of the following?

Options:

A.

The purpose of the data tracking.

B.

That the individual is aware tracking is occurring.

C.

The authentication mechanism proposed.

D.

The encryption of individual physical attributes.

Buy Now
Questions 27

Machine-learning based solutions present a privacy risk because?

Options:

A.

Training data used during the training phase is compromised.

B.

The solution may contain inherent bias from the developers.

C.

The decision-making process used by the solution is not documented.

D.

Machine-learning solutions introduce more vulnerabilities than other software.

Buy Now
Questions 28

Which of the following is NOT a step in the methodology of a privacy risk framework?

Options:

A.

Assessment.

B.

Monitoring.

C.

Response.

D.

Ranking.

Buy Now
Questions 29

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?

Options:

A.

Configuring the environment to use shorter error messages.

B.

Handing exceptions internally and not displaying errors to the user.

C.

Creating default error pages or error messages which do not include variable data.

D.

Logging the session name and necessary parameters once the error occurs to enable trouble shooting.

Buy Now
Questions 30

SCENARIO

Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick and Harry are veteran senior information privacy and security professionals at their respective companies, and continue to lead the east and west divisions of New Company. The purpose of the meeting was to conduct a SWOT (strengths/weaknesses/opportunities/threats) analysis for New Company. Their SWOT analysis conclusions are summarized below.

Dick was enthusiastic about an opportunity for the New Company to reduce costs and increase computing power and flexibility through cloud services. East Company had been contemplating moving to the cloud, but West Company already had a vendor that was providing it with software-as-a-service (SaaS). Dick was looking forward to extending this service to the eastern region. Harry noted that this was a threat as well, because West Company had to rely on the third party to protect its data.

Tom mentioned that neither of the legacy companies had sufficient data storage space to meet the projected growth of New Company, which he saw as a weakness. Tom stated that one of the team's first projects would be to construct a consolidated New Company data warehouse. Tom would personally lead this project and would be held accountable if information was modified during transmission to or during storage in the new data warehouse.

Tom, Dick and Harry agreed that employee network access could be considered both a strength and a weakness. East Company and West Company had strong performance records in this regard; both had robust network access controls that were working as designed. However, during a projected year-long transition period, New Company employees would need to be able to connect to a New Company network while retaining access to the East Company and West Company networks.

Which statement is correct about addressing New Company stakeholders’ expectations for privacy?

Options:

A.

New Company should expect consumers to read the company’s privacy policy.

B.

New Company should manage stakeholder expectations for privacy even when the stakeholders‘ data is not held by New Company.

C.

New Company would best meet consumer expectations for privacy by adhering to legal requirements.

D.

New Company's commitment to stakeholders ends when the stakeholders’ data leaves New Company.

Buy Now
Questions 31

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

Regarding the app, which action is an example of a decisional interference violation?

Options:

A.

The app asks income level to determine the treatment of care.

B.

The app sells aggregated data to an advertising company without prior consent.

C.

The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.

D.

The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual’s symptoms.

Buy Now
Questions 32

What was the first privacy framework to be developed?

Options:

A.

OECD Privacy Principles.

B.

Generally Accepted Privacy Principles.

C.

Code of Fair Information Practice Principles (FIPPs).

D.

The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.

Buy Now
Questions 33

Why is first-party web tracking very difficult to prevent?

Options:

A.

The available tools to block tracking would break most sites’ functionality.

B.

Consumers enjoy the many benefits they receive from targeted advertising.

C.

Regulatory frameworks are not concerned with web tracking.

D.

Most browsers do not support automatic blocking.

Buy Now
Questions 34

Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?

Options:

A.

A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain level, it flashes a message about new themes released that day.

B.

An interactive toy copies a child’s behavior through gestures and kid-friendly sounds. It runs on battery power and automatically connects to a base station at home to charge itself.

C.

A math tutoring service commissioned an advertisement on a bulletin board inside a charter school. The service makes it simple to reach out to tutors through a QR-code shaped like a cartoon character.

D.

A note-taking application converts hard copies of kids’ class notes into audio books in seconds. It does so by using the processing power of idle server farms.

Buy Now
Questions 35

Which of the following is a vulnerability of a sensitive biometrics authentication system?

Options:

A.

False positives.

B.

False negatives.

C.

Slow recognition speeds.

D.

Theft of finely individualized personal data.

Buy Now
Questions 36

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:

A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Buy Now
Questions 37

You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?

Options:

A.

Remnant.

B.

Behavioral.

C.

Contextual.

D.

Demographic.

Buy Now
Questions 38

Which of the following is most important to provide to the data subject before the collection phase of the data lifecycle?

Options:

A.

Privacy Notice.

B.

Disclosure Policy.

C.

Consent Request.

D.

Data Protection Policy.

Buy Now
Questions 39

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

    Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

    The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

    DES is the strongest encryption algorithm currently used for any file.

    Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

    Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which is true regarding the type of encryption Lancelot uses?

Options:

A.

It employs the data scrambling technique known as obfuscation.

B.

Its decryption key is derived from its encryption key.

C.

It uses a single key for encryption and decryption.

D.

It is a data masking methodology.

Buy Now
Questions 40

it Is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

Options:

A.

Breaches of an individual's data.

B.

Illicit collection of personal data.

C.

Manipulation of a user's choice.

D.

Discrimination from profiling.

Buy Now
Questions 41

Which privacy engineering objective proposed by the US National Institute of Science and Technology (NIST) decreases privacy risk by ensuring that connections between individuals and their personal data are reduced?

Options:

A.

Disassoc lability

B.

Manageability

C.

Minimization

D.

Predictability

Buy Now
Questions 42

What is the main issue pertaining to data protection with the use of 'deep fakes'?

Options:

A.

Misinformation.

B.

Non-conformity with the accuracy principle.

C.

Issues with establishing non-repudiation.

D.

Issues with confidentiality of the information.

Buy Now
Questions 43

Ivan is a nurse for a home healthcare service provider in the US. The company has implemented a mobile application which Ivan uses to record a patient's vital statistics and access a patient's health care records during home visits. During one visitj^van is unable to access the health care application to record the patient's vitals. He instead records the information on his mobile phone's note-taking application to enter the data in the health care application the next time it is accessible. What would be the best course of action by the IT department to ensure the data is protected on his device?

Options:

A.

Provide all healthcare employees with mandatory annual security awareness training with a focus on the health

information protection.

B.

Complete a SWOT analysis exercise on the mobile application to identify what caused the application to be

inaccessible and remediate any issues.

C.

Adopt mobile platform standards to ensure that only mobile devices that support encryption capabilities are used.

D.

Implement Mobile Device Management (MDM) to enforce company security policies and configuration settings.

Buy Now
Questions 44

Which of the following is considered a records management best practice?

Options:

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Buy Now
Questions 45

Which of the following suggests the greatest degree of transparency?

Options:

A.

A privacy disclosure statement clearly articulates general purposes for collection

B.

The data subject has multiple opportunities to opt-out after collection has occurred.

C.

A privacy notice accommodates broadly defined future collections for new products.

D.

After reading the privacy notice, a data subject confidently infers how her information will be used.

Buy Now
Questions 46

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Which of the following issues is most likely to require an investigation by the Chief Privacy Officer (CPO) of WebTracker?

Options:

A.

Data flows use encryption for data at rest, as defined by the IT manager.

B.

AmaZure sends newsletter to WebTracker customers, as approved by the Marketing Manager.

C.

Employees’ personal data are being stored in a cloud HR system, as approved by the HR Manager.

D.

File Integrity Monitoring is being deployed in SQL servers, as indicated by the IT Architect Manager.

Buy Now
Questions 47

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

Options:

A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Buy Now
Questions 48

How should the sharing of information within an organization be documented?

Options:

A.

With a binding contract.

B.

With a data flow diagram.

C.

With a disclosure statement.

D.

With a memorandum of agreement.

Buy Now
Questions 49

What is an Access Control List?

Options:

A.

A list of steps necessary for an individual to access a resource.

B.

A list that indicates the type of permission granted to each individual.

C.

A list showing the resources that an individual has permission to access.

D.

A list of individuals who have had their access privileges to a resource revoked.

Buy Now
Questions 50

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Ted's implementation is most likely a response to what incident?

Options:

A.

Encryption keys were previously unavailable to the organization's cloud storage host.

B.

Signatureless advanced malware was detected at multiple points on the organization's networks.

C.

Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network.

D.

Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor.

Buy Now
Questions 51

An organization is deciding between building a solution in-house versus purchasing a solution for a new customer facing application. When security threat are taken into consideration, a key advantage of purchasing a solution would be the availability of?

Options:

A.

Outsourcing.

B.

Persistent VPN.

C.

Patching and updates.

D.

Digital Rights Management.

Buy Now
Questions 52

After committing to a Privacy by Design program, which activity should take place first?

Options:

A.

Create a privacy standard that applies to all projects and services.

B.

Establish a retention policy for all data being collected.

C.

Implement easy to use privacy settings for users.

D.

Perform privacy reviews on new projects.

Buy Now
Questions 53

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

What is a key consideration for assessing external service providers like LeadOps, which will conduct personal information processing operations on Clean-Q's behalf?

Options:

A.

Understanding LeadOps’ costing model.

B.

Establishing a relationship with the Managing Director of LeadOps.

C.

Recognizing the value of LeadOps’ website holding a verified security certificate.

D.

Obtaining knowledge of LeadOps' information handling practices and information security environment.

Buy Now
Questions 54

Which Privacy by Design principle requires architects and operators to emphasize the interests of the individual by offering measures such as strong privacy defaults, appropriate

notice, and user-friendly options?

Options:

A.

Data lifecycle protection.

B.

Embedded into design.

C.

Respect for user privacy.

D.

Proactive not reactive.

Buy Now
Questions 55

Which activity would best support the principle of data quality?

Options:

A.

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.

Ensuring that the number of teams processing personal information is limited.

C.

Delivering information in a format that the data subject understands.

D.

Ensuring that information remains accurate.

Buy Now
Questions 56

Which of the following activities would be considered the best method for an organization to achieve the privacy principle of data quality'?

Options:

A.

Clash customer information with information from a data broker

B.

Build a system with user access controls and approval workflows to edit customer data

C.

Set a privacy notice covering the purpose for collection of a customer's data

D.

Provide a customer with a copy of their data in a machine-readable format

Buy Now
Questions 57

Which of the following CANNOT be effectively determined during a code audit?

Options:

A.

Whether access control logic is recommended in all cases.

B.

Whether data is being incorrectly shared with a third-party.

C.

Whether consent is durably recorded in the case of a server crash.

D.

Whether the differential privacy implementation correctly anonymizes data.

Buy Now
Questions 58

An organization has recently experienced a data breach where large amounts of personal data were compromised. As part of a post-incident review, the privacy technologist wants to analyze available data to understand what vulnerabilities may have contributed to the incident occurring. He learns that a key vulnerability had been flagged by the system but that detective controls were not operating effectively. Which type of web application security risk does this finding most likely point to?

Options:

A.

Insecure Design.

B.

Misconfiguration.

C.

Vulnerable and Outdated Components.

D.

Logging and Monitoring Failures.

Buy Now
Questions 59

Value Sensitive Design (VSD) focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Principles and standards.

D.

Privacy and human rights.

Buy Now
Questions 60

Which is NOT a suitable action to apply to data when the retention period ends?

Options:

A.

Aggregation.

B.

De-identification.

C.

Deletion.

D.

Retagging.

Buy Now
Questions 61

Which of the following is NOT relevant to a user exercising their data portability rights?

Options:

A.

Notice and consent for the downloading of data.

B.

Detection of phishing attacks against the portability interface.

C.

Re-authentication of an account, including two-factor authentication as appropriate.

D.

Validation of users with unauthenticated identifiers (e.g. IP address, physical address).

Buy Now
Questions 62

How does browser fingerprinting compromise privacy?

Options:

A.

By creating a security vulnerability.

B.

By differentiating users based upon parameters.

C.

By persuading users to provide personal information.

D.

By customizing advertising based on the geographic location.

Buy Now
Questions 63

Which of the following would be an example of an "objective" privacy harm to an individual?

Options:

A.

Receiving spam following the sale an of email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Inaccuracies in personal data.

Buy Now
Questions 64

What would be an example of an organization transferring the risks associated with a data breach?

Options:

A.

Using a third-party service to process credit card transactions.

B.

Encrypting sensitive personal data during collection and storage

C.

Purchasing insurance to cover the organization in case of a breach.

D.

Applying industry standard data handling practices to the organization’ practices.

Buy Now
Questions 65

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Why is Jordan’s claim that the company does not collect personal information as identified by the GDPR inaccurate?

Options:

A.

The potential customers must browse for products online.

B.

The fitness trackers capture sleep and heart rate data to monitor an individual’s behavior.

C.

The website collects the customers’ and users’ region and country information.

D.

The customers must pair their fitness trackers to either smartphones or computers.

Buy Now
Questions 66

Combining multiple pieces of information about an individual to produce a whole that is greater than the sum of its parts is called?

Options:

A.

Identification.

B.

Insecurity.

C.

Aggregation.

D.

Exclusion.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist
Last Update: Nov 21, 2024
Questions: 220

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80