New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CIPT Certified Information Privacy Technologist Questions and Answers

Questions 4

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

Options:

A.

Relationship of family member

B.

Phone number

C.

Dale of birth

D.

Citizenship

Buy Now
Questions 5

Data oriented strategies Include which of the following?

Options:

A.

Minimize. Separate, Abstract, Hide.

B.

Inform, Control, Enforce, Demonstrate.

C.

Encryption, Hashing, Obfuscation, Randomization.

D.

Consent. Contract, Legal Obligation, Legitimate interests.

Buy Now
Questions 6

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which technology is best suited for the contact tracing feature of the app1?

Options:

A.

Bluetooth

B.

Deep learning

C.

Near Field Communication (NFC)

D.

Radio-Frequency Identification (RFID)

Buy Now
Questions 7

Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?

Options:

A.

A group of hackers infiltrate a power grid and cause a major blackout.

B.

An insurance company raises a person’s rates based on driving habits gathered from a connected car.

C.

A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits.

D.

A water district fines an individual after a meter reading reveals excess water use during drought conditions.

Buy Now
Questions 8

An organization is using new technologies that will target and process personal data of EU customers. In which of the following circumstances would a privacy technologist need to support a data protection impact assessment (DPIA)?

Options:

A.

If a privacy notice and opt-m consent box are not displayed to the individual

B.

If security of data processing has not been evaluated

C.

If a large amount of personal data will be collected.

D.

If data processing is a high risk to an individual's rights and freedoms

Buy Now
Questions 9

Which of the following entities would most likely be exempt from complying with the General Data Protection Regulation (GDPR)?

Options:

A.

A South American company that regularly collects European customers’ personal data.

B.

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.

C.

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.

D.

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.

Buy Now
Questions 10

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

Regarding the app, which action is an example of a decisional interference violation?

Options:

A.

The app asks income level to determine the treatment of care.

B.

The app sells aggregated data to an advertising company without prior consent.

C.

The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.

D.

The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual’s symptoms.

Buy Now
Questions 11

Value sensitive design focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Buy Now
Questions 12

An organization is deciding between building a solution in-house versus purchasing a solution for a new customer facing application. When security threat are taken into consideration, a key advantage of purchasing a solution would be the availability of?

Options:

A.

Outsourcing.

B.

Persistent VPN.

C.

Patching and updates.

D.

Digital Rights Management.

Buy Now
Questions 13

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

Options:

A.

Investors.

B.

Regulators.

C.

Industry groups.

D.

Corporate researchers.

Buy Now
Questions 14

of the following best describes a network threat model and Its uses?

Options:

A.

It Is used in software development to detect programming errors. .

B.

It is a risk-based model used to calculate the probabilities of risks identified during vulnerability tests.

C.

It helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.

D.

It combines the results of vulnerability and penetration tests to provide useful insights into the network's overall threat and security posture.

Buy Now
Questions 15

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

Options:

A.

Server driven controls.

B.

Cloud computing

C.

Data on demand

D.

MAC filtering

Buy Now
Questions 16

There are two groups of users. In a company, where one group Is allowed to see credit card numbers, while the other group Is not. Both are accessing the data through the same application. The most effective and efficient way to achieve this would be?

Options:

A.

Have two copies of the data, one copy where the credit card numbers are obfuscated, while the other copy has them in the clear. Serve up from

the appropriate copy depending on the user accessing it.

B.

Have the data encrypted at rest, and selectively decrypt It for the users who have the rights to see it.

C.

Obfuscate the credit card numbers whenever a user who does not have the right to see them accesses the data.

D.

Drop credit card numbers altogether whenever a user who does not have the right to see them accesses the data.

Buy Now
Questions 17

Information classification helps an organization protect confidential and nonpublic information primarily because?

Options:

A.

It helps identify sensitive and critical information that require very strict safeguards.

B.

It falls under the security principles of confidentiality, integrity, and availability.

C.

It promotes employee accountability for safeguarding confidential information.

D.

It is legally required under most regulations.

Buy Now
Questions 18

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?

Options:

A.

Limited-retention, de-identified logs including only metadata.

B.

Limited-retention, de-identified logs including the links clicked in messages as well as metadata.

C.

Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.

D.

Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.

Buy Now
Questions 19

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

Which should be used to allow the home sales force to accept payments using smartphones?

Options:

A.

Field transfer protocol.

B.

Cross-current translation.

C.

Near-field communication

D.

Radio Frequency Identification

Buy Now
Questions 20

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

Options:

A.

Categorization.

B.

Remediation.

C.

Retention.

D.

Security

Buy Now
Questions 21

A key principle of an effective privacy policy is that it should be?

Options:

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Buy Now
Questions 22

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:

A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Buy Now
Questions 23

Which is NOT a suitable action to apply to data when the retention period ends?

Options:

A.

Aggregation.

B.

De-identification.

C.

Deletion.

D.

Retagging.

Buy Now
Questions 24

Which of the following is an example of drone “swarming”?

Options:

A.

A drone filming a cyclist from above as he rides.

B.

A drone flying over a building site to gather data.

C.

Drones delivering retailers’ packages to private homes.

D.

Drones communicating with each other to perform a search and rescue.

Buy Now
Questions 25

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

What IT architecture would be most appropriate for this mobile platform?

Options:

A.

Peer-to-peer architecture.

B.

Client-server architecture.

C.

Plug-in-based architecture.

D.

Service-oriented architecture.

Buy Now
Questions 26

Organizations understand there are aggregation risks associated with the way the process their customer’s data. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

Options:

A.

Risk transfer.

B.

Risk mitigation.

C.

Risk avoidance.

D.

Risk acceptance.

Buy Now
Questions 27

A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?

Options:

A.

Geofencing

B.

Geo-tracking

C.

Geo-tagging

D.

Geolocation

Buy Now
Questions 28

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

Options:

A.

The data and recipients for medical research are not specified

B.

Insufficient information is provided on notifications and infection alerts

C.

The sharing of information with an affiliated healthcare provider is too risky

D.

Allowing users to share risk result information for exposure and contact tracing purposes

Buy Now
Questions 29

You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?

Options:

A.

Remnant.

B.

Behavioral.

C.

Contextual.

D.

Demographic.

Buy Now
Questions 30

Which of the following does NOT illustrate the ‘respect to user privacy’ principle?

Options:

A.

Implementing privacy elements within the user interface that facilitate the use of technology by any visually-challenged users.

B.

Enabling Data Subject Access Request (DSARs) that provide rights for correction, deletion, amendment and rectification of personal information.

C.

Developing a consent management self-service portal that enables the data subjects to review the details of consent provided to an organization.

D.

Filing breach notification paperwork with data protection authorities which detail the impact to data subjects.

Buy Now
Questions 31

What is the potential advantage of homomorphic encryption?

Options:

A.

Encrypted information can be analyzed without decrypting it first.

B.

Ciphertext size decreases as the security level increases.

C.

It allows greater security and faster processing times.

D.

It makes data impenetrable to attacks.

Buy Now
Questions 32

In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?

Options:

A.

The size of the data.

B.

The format of the data.

C.

The range of the data.

D.

The medium of the data.

Buy Now
Questions 33

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?

Options:

A.

Configuring the environment to use shorter error messages.

B.

Handing exceptions internally and not displaying errors to the user.

C.

Creating default error pages or error messages which do not include variable data.

D.

Logging the session name and necessary parameters once the error occurs to enable trouble shooting.

Buy Now
Questions 34

it Is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

Options:

A.

Breaches of an individual's data.

B.

Illicit collection of personal data.

C.

Manipulation of a user's choice.

D.

Discrimination from profiling.

Buy Now
Questions 35

What is the main function of the Amnesic Incognito Live System or TAILS device?

Options:

A.

It allows the user to run a self-contained computer from a USB device.

B.

It accesses systems with a credential that leaves no discernable tracks.

C.

It encrypts data stored on any computer on a network.

D.

It causes a system to suspend its security protocols.

Buy Now
Questions 36

An organization has recently experienced a data breach where large amounts of personal data were compromised. As part of a post-incident review, the privacy technologist wants to analyze available data to understand what vulnerabilities may have contributed to the incident occurring. He learns that a key vulnerability had been flagged by the system but that detective controls were not operating effectively. Which type of web application security risk does this finding most likely point to?

Options:

A.

Insecure Design.

B.

Misconfiguration.

C.

Vulnerable and Outdated Components.

D.

Logging and Monitoring Failures.

Buy Now
Questions 37

A clinical research organization is processing highly sensitive personal data, including numerical attributes, from medical trial results. The organization needs to manipulate the data without revealing the contents to data users. This can be achieved by utilizing?

Options:

A.

k-anonymity.

B.

Microdata sets.

C.

Polymorphic encryption.

D.

Homomorphic encryption.

Buy Now
Questions 38

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

Options:

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Buy Now
Questions 39

Properly configured databases and well-written website codes are the best protection against what online threat?

Options:

A.

Pharming.

B.

SQL injection.

C.

Malware execution.

D.

System modification.

Buy Now
Questions 40

How does k-anonymity help to protect privacy in micro data sets?

Options:

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

D.

By top-coding all age data above a value of "k."

Buy Now
Questions 41

When should code audits be concluded?

Options:

A.

At code check-in time.

B.

At engineering design time.

C.

While code is being sent to production.

D.

Before launch after all code for a feature is complete.

Buy Now
Questions 42

Which of the following is most important to provide to the data subject before the collection phase of the data lifecycle?

Options:

A.

Privacy Notice.

B.

Disclosure Policy.

C.

Consent Request.

D.

Data Protection Policy.

Buy Now
Questions 43

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

Options:

A.

Encryption.

B.

Access Controls.

C.

De-identification.

D.

Multi-factor authentication.

Buy Now
Questions 44

Machine-learning based solutions present a privacy risk because?

Options:

A.

Training data used during the training phase is compromised.

B.

The solution may contain inherent bias from the developers.

C.

The decision-making process used by the solution is not documented.

D.

Machine-learning solutions introduce more vulnerabilities than other software.

Buy Now
Questions 45

What is an Access Control List?

Options:

A.

A list of steps necessary for an individual to access a resource.

B.

A list that indicates the type of permission granted to each individual.

C.

A list showing the resources that an individual has permission to access.

D.

A list of individuals who have had their access privileges to a resource revoked.

Buy Now
Questions 46

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

Options:

A.

Phishing emails.

B.

Denial of service.

C.

Brute-force attacks.

D.

Social engineering.

Buy Now
Questions 47

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

Options:

A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Buy Now
Questions 48

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

What is the best way to minimize the risk of an exposure violation through the use of the app?

Options:

A.

Prevent the downloading of photos stored in the app.

B.

Dissociate the patient health data from the personal data.

C.

Exclude the collection of personal information from the health record.

D.

Create a policy to prevent combining data with external data sources.

Buy Now
Questions 49

Which is NOT a way to validate a person's identity?

Options:

A.

Swiping a smartcard into an electronic reader.

B.

Using a program that creates random passwords.

C.

Answering a question about "something you know”.

D.

Selecting a picture and tracing a unique pattern on it

Buy Now
Questions 50

An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?

Options:

A.

Transfer the data to another location.

B.

Invoke the appropriate deletion clause in the cloud terms and conditions.

C.

Obtain a destruction certificate from the cloud vendor.

D.

Destroy all encryption keys associated with the data.

Buy Now
Questions 51

A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?

Options:

A.

Explicit.

B.

Implicit.

C.

Specific

D.

Valid.

Buy Now
Questions 52

What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?

Options:

A.

The ad being served to the user may not be relevant.

B.

The user’s sensitive personal information is used to display targeted ads.

C.

The personal information used to target ads can be discerned by the server.

D.

The user’s information can be leaked to an advertiser through weak de-identification techniques.

Buy Now
Questions 53

What element is most conducive to fostering a sound privacy by design culture in an organization?

Options:

A.

Ensuring all employees acknowledge and understood the privacy policy.

B.

Frequent privacy and security awareness training for employees.

C.

Monthly reviews of organizational privacy principles.

D.

Gaining advocacy from senior management.

Buy Now
Questions 54

Which of the following statements best describes the relationship between privacy and security?

Options:

A.

Security systems can be used to enforce compliance with privacy policies.

B.

Privacy and security are independent; organizations must decide which should by emphasized.

C.

Privacy restricts access to personal information; security regulates how information should be used.

D.

Privacy protects data from being viewed during collection and security governs how collected data should be shared.

Buy Now
Questions 55

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Based on the current features of the fitness watch, what would you recommend be implemented into each device in order to most effectively ensure privacy?

Options:

A.

Hashing.

B.

A2DP Bluetooth profile.

C.

Persistent unique identifier.

D.

Randomized MAC address.

Buy Now
Questions 56

Which of the following is NOT a step in the methodology of a privacy risk framework?

Options:

A.

Assessment.

B.

Monitoring.

C.

Response.

D.

Ranking.

Buy Now
Questions 57

A credit card with the last few numbers visible is an example of what?

Options:

A.

Masking data

B.

Synthetic data

C.

Sighting controls.

D.

Partial encryption

Buy Now
Questions 58

Which of the following is the most important action to take prior to collecting personal data directly from a customer?

Options:

A.

Define what data needs to be collected.

B.

Define the purpose for collecting and using the data.

C.

Identify business requirements for the data that will be collected.

D.

Provide individuals with information about how their data will be used after collection.

Buy Now
Questions 59

What term describes two re-identifiable data sets that both come from the same unidentified individual?

Options:

A.

Pseudonymous data.

B.

Anonymous data.

C.

Aggregated data.

D.

Imprecise data.

Buy Now
Questions 60

What has been identified as a significant privacy concern with chatbots?

Options:

A.

Most chatbot providers do not agree to code audits

B.

Chatbots can easily verify the identity of the contact.

C.

Users’ conversations with chatbots are not encrypted in transit.

D.

Chatbot technology providers may be able to read chatbot conversations with users.

Buy Now
Questions 61

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which data lifecycle phase needs the most attention at this Ontario medical center?

Options:

A.

Retention

B.

Disclosure

C.

Collection

D.

Use

Buy Now
Questions 62

What has been found to undermine the public key infrastructure system?

Options:

A.

Man-in-the-middle attacks.

B.

Inability to track abandoned keys.

C.

Disreputable certificate authorities.

D.

Browsers missing a copy of the certificate authority's public key.

Buy Now
Questions 63

Which of the following statements describes an acceptable disclosure practice?

Options:

A.

An organization’s privacy policy discloses how data will be used among groups within the organization itself.

B.

With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.

C.

Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.

D.

When an organization discloses data to a vendor, the terms of the vendor’ privacy notice prevail over the organization’ privacy notice.

Buy Now
Questions 64

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

Options:

A.

Verifying the accuracy of the data by contacting users.

B.

Validating the company’s data collection procedures.

C.

Introducing erroneous data to see if its detected.

D.

Tracking changes to data through auditing.

Buy Now
Questions 65

Which privacy engineering objective proposed by the US National Institute of Science and Technology (NIST) decreases privacy risk by ensuring that connections between individuals and their personal data are reduced?

Options:

A.

Disassoc lability

B.

Manageability

C.

Minimization

D.

Predictability

Buy Now
Questions 66

An organization is launching a new online subscription-based publication. As the service is not aimed at children, users are asked for their date of birth as part of the of the sign-up process. The privacy technologist suggests it may be more appropriate ask if an individual is over 18 rather than requiring they provide a date of birth. What kind of threat is the privacy technologist concerned about?

Options:

A.

Identification.

B.

Insecurity.

C.

Interference.

D.

Minimization.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist
Last Update: Dec 25, 2024
Questions: 220
CIPT pdf

CIPT PDF

$25.5  $84.99
CIPT Engine

CIPT Testing Engine

$30  $99.99
CIPT PDF + Engine

CIPT PDF + Testing Engine

$40.5  $134.99