Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CIPT Sample Questions Answers

Questions 4

Organizations understand there are aggregation risks associated with the way the process their customer’s data. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

Options:

A.

Risk transfer.

B.

Risk mitigation.

C.

Risk avoidance.

D.

Risk acceptance.

Buy Now
Questions 5

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

Options:

A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Buy Now
Questions 6

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Which data practice is Barney most likely focused on improving?

Options:

A.

Deletion

B.

Inventory.

C.

Retention.

D.

Sharing

Buy Now
Questions 7

Which of the following is an example of drone “swarming”?

Options:

A.

A drone filming a cyclist from above as he rides.

B.

A drone flying over a building site to gather data.

C.

Drones delivering retailers’ packages to private homes.

D.

Drones communicating with each other to perform a search and rescue.

Buy Now
Questions 8

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

Options:

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Buy Now
Questions 9

What must be used in conjunction with disk encryption?

Options:

A.

Increased CPU speed.

B.

A strong password.

C.

A digital signature.

D.

Export controls.

Buy Now
Questions 10

Which of the following CANNOT be effectively determined during a code audit?

Options:

A.

Whether access control logic is recommended in all cases.

B.

Whether data is being incorrectly shared with a third-party.

C.

Whether consent is durably recorded in the case of a server crash.

D.

Whether the differential privacy implementation correctly anonymizes data.

Buy Now
Questions 11

Which is NOT a way to validate a person's identity?

Options:

A.

Swiping a smartcard into an electronic reader.

B.

Using a program that creates random passwords.

C.

Answering a question about "something you know”.

D.

Selecting a picture and tracing a unique pattern on it

Buy Now
Questions 12

After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation:

Statement 1 reads: “Please check this box to confirm you have read and accept the terms and conditions of the end user license agreement” and includes a hyperlink to the terms and conditions.

Statement 2 reads: “Please check this box to confirm you have read and understood the privacy notice” and includes a hyperlink to the privacy notice.

Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?

Options:

A.

Consent.

B.

Vital interests.

C.

Legal obligation.

D.

Legitimate interests.

Buy Now
Questions 13

Which of the following entities would most likely be exempt from complying with the General Data Protection Regulation (GDPR)?

Options:

A.

A South American company that regularly collects European customers’ personal data.

B.

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.

C.

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.

D.

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.

Buy Now
Questions 14

When writing security policies, the most important consideration is to?

Options:

A.

Require all employees to read and acknowledge their understanding.

B.

Ensure they are based on the organization's risk profile.

C.

Ensure they cover enough details for common situations.

D.

Follow industry best practices.

Buy Now
Questions 15

When should code audits be concluded?

Options:

A.

At code check-in time.

B.

At engineering design time.

C.

While code is being sent to production.

D.

Before launch after all code for a feature is complete.

Buy Now
Questions 16

What is the distinguishing feature of asymmetric encryption?

Options:

A.

It has a stronger key for encryption than for decryption.

B.

It employs layered encryption using dissimilar methods.

C.

It uses distinct keys for encryption and decryption.

D.

It is designed to cross operating systems.

Buy Now
Questions 17

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?

Options:

A.

Develop a technical privacy framework that integrates with the development lifecycle.

B.

Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.

C.

Identify the privacy requirements as a part of the Privacy Impact Assessment (PIA) process during development and evaluation stages.

D.

Develop training programs that aid the developers in understanding how to turn privacy requirements into actionable code and design level specifications.

Buy Now
Questions 18

What is a mistake organizations make when establishing privacy settings during the development of applications?

Options:

A.

Providing a user with too many choices.

B.

Failing to use "Do Not Track” technology.

C.

Providing a user with too much third-party information.

D.

Failing to get explicit consent from a user on the use of cookies.

Buy Now
Questions 19

Which of the following is the least effective privacy preserving practice in the Systems Development Life Cycle (SDLC)?

Options:

A.

Conducting privacy threat modeling for the use-case.

B.

Following secure and privacy coding standards in the development.

C.

Developing data flow modeling to identify sources and destinations of sensitive data.

D.

Reviewing the code against Open Web Application Security Project (OWASP) Top 10 Security Risks.

Buy Now
Questions 20

An organization's customers have suffered a number of data breaches through successful social engineering attacks. One potential solution to remediate and prevent future occurrences would be to implement which of the following?

A Differential identifiability.

B. Multi-factor authentication.

C. Greater password complexity.

D. Attribute-based access control.

Options:

Buy Now
Questions 21

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

The location data collected and displayed on the map should be changed for which of the following reasons?

Options:

A.

The blurriness does not allow users to know how close they are to an infected person

B.

The radius used for location data exceeds official social distancing rules

C.

The location data has not been pseudonymized

D.

The location data is loo precise

Buy Now
Questions 22

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the strongest method for authenticating Chuck’s identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

Options:

A.

By requiring Chuck use the last 4 digits of his driver’s license number in combination with a unique PIN provided within the violation notice.

B.

By requiring Chuck use his credit card number in combination with the last 4 digits of his driver’s license.

C.

By requiring Chuck use the rental agreement number in combination with his email address.

D.

By requiring Chuck to call AMP Payment Resources directly and provide his date of birth and home address.

Buy Now
Questions 23

SCENARIO

Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick and Harry are veteran senior information privacy and security professionals at their respective companies, and continue to lead the east and west divisions of New Company. The purpose of the meeting was to conduct a SWOT (strengths/weaknesses/opportunities/threats) analysis for New Company. Their SWOT analysis conclusions are summarized below.

Dick was enthusiastic about an opportunity for the New Company to reduce costs and increase computing power and flexibility through cloud services. East Company had been contemplating moving to the cloud, but West Company already had a vendor that was providing it with software-as-a-service (SaaS). Dick was looking forward to extending this service to the eastern region. Harry noted that this was a threat as well, because West Company had to rely on the third party to protect its data.

Tom mentioned that neither of the legacy companies had sufficient data storage space to meet the projected growth of New Company, which he saw as a weakness. Tom stated that one of the team's first projects would be to construct a consolidated New Company data warehouse. Tom would personally lead this project and would be held accountable if information was modified during transmission to or during storage in the new data warehouse.

Tom, Dick and Harry agreed that employee network access could be considered both a strength and a weakness. East Company and West Company had strong performance records in this regard; both had robust network access controls that were working as designed. However, during a projected year-long transition period, New Company employees would need to be able to connect to a New Company network while retaining access to the East Company and West Company networks.

Which statement is correct about addressing New Company stakeholders’ expectations for privacy?

Options:

A.

New Company should expect consumers to read the company’s privacy policy.

B.

New Company should manage stakeholder expectations for privacy even when the stakeholders‘ data is not held by New Company.

C.

New Company would best meet consumer expectations for privacy by adhering to legal requirements.

D.

New Company's commitment to stakeholders ends when the stakeholders’ data leaves New Company.

Buy Now
Questions 24

What is true of providers of wireless technology?

Options:

A.

They have the legal right in most countries to control and use any data on their systems.

B.

They can see all unencrypted data that crosses the system.

C.

They are typically exempt from data security regulations.

D.

They routinely backup data that crosses their system.

Buy Now
Questions 25

What is the main function of the Amnesic Incognito Live System or TAILS device?

Options:

A.

It allows the user to run a self-contained computer from a USB device.

B.

It accesses systems with a credential that leaves no discernable tracks.

C.

It encrypts data stored on any computer on a network.

D.

It causes a system to suspend its security protocols.

Buy Now
Questions 26

Value sensitive design focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Buy Now
Questions 27

Which privacy engineering objective proposed by the US National Institute of Science and Technology (NIST) decreases privacy risk by ensuring that connections between individuals and their personal data are reduced?

Options:

A.

Disassoc lability

B.

Manageability

C.

Minimization

D.

Predictability

Buy Now
Questions 28

You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?

Options:

A.

Remnant.

B.

Behavioral.

C.

Contextual.

D.

Demographic.

Buy Now
Questions 29

A key principle of an effective privacy policy is that it should be?

Options:

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Buy Now
Questions 30

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:

A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Buy Now
Questions 31

An organization is evaluating a number of Machine Learning (ML) solutions to help automate a customer-facing part of its business From a privacy perspective, the organization should first?

Options:

A.

Define their goals for fairness

B.

Document the distribution of bias scores

C.

Document the False Positive Rates (FPR).

D.

Define how data subjects may object to the processing

Buy Now
Questions 32

Not updating software for a system that processes human resources data with the latest security patches may create what?

Options:

A.

Authentication issues.

B.

Privacy vulnerabilities.

C.

Privacy threat vectors.

D.

Reportable privacy violations.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist (CIPT)
Last Update: Apr 24, 2024
Questions: 214
$64  $159.99
$48  $119.99
$40  $99.99
buy now CIPT