Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

CIPT Certified Information Privacy Technologist Questions and Answers

Questions 4

How does k-anonymity help to protect privacy in micro data sets?

Options:

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

D.

By top-coding all age data above a value of "k."

Buy Now
Questions 5

Which of the following is considered a records management best practice?

Options:

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Buy Now
Questions 6

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

Options:

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Buy Now
Questions 7

Which of the following is NOT a valid basis for data retention?

Options:

A.

Size of the data.

B.

Type of the data.

C.

Location of the data.

D.

Last time the data was accessed.

Buy Now
Questions 8

What is the main benefit of using dummy data during software testing?

Options:

A.

The data comes in a format convenient for testing.

B.

Statistical disclosure controls are applied to the data.

C.

The data enables the suppression of particular values in a set.

D.

Developers do not need special privacy training to test the software.

Buy Now
Questions 9

When designing a new system, which of the following is a privacy threat that the privacy technologist should consider?

Options:

A.

Encryption.

B.

Social distancing.

C.

Social engineering.

D.

Identity and Access Management.

Buy Now
Questions 10

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system?

Options:

A.

Asymmetric Encryption

B.

Symmetric Encryption

C.

Obfuscation

D.

Hashing

Buy Now
Questions 11

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

RFID can be utilized to track people or consumer products

B.

RFID can be utilized to gam unauthorized access to an individual's device

C.

RFID can be utilized to spoof identification details

D.

RFID can be utilized to read information from a device without the user's knowledge

Buy Now
Questions 12

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

Options:

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Buy Now
Questions 13

Which of the following best describes the basic concept of "Privacy by Design?"

Options:

A.

The adoption of privacy enhancing technologies.

B.

The integration of a privacy program with all lines of business.

C.

The implementation of privacy protection through system architecture.

D.

The introduction of business process to identify and assess privacy gaps.

Buy Now
Questions 14

Many modern vehicles incorporate technologies that increase the convenience of drivers, but collect information about driver behavior in order to Implement this. What should vehicle manufacturers prioritize to ensure enhanced privacy protection for drivers?

Options:

A.

Share the sensitive data collected about driver behavior with the driver.

B.

Derive implicit consent for the processing of sensitive data by the continued use of the vehicle.

C.

Obtain affirmative consent for processing of sensitive data about the driver.

D.

Provide easy to read, in-vehicle instructions about how to use the technology.

Buy Now
Questions 15

Which of the following would be an example of an "objective" privacy harm to an individual, based on Calo's Harm Dimensions?

Options:

A.

Receiving spam following the sale of an email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Personal data inaccuracies present in a user's social media profile.

Buy Now
Questions 16

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

    Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

    The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

    DES is the strongest encryption algorithm currently used for any file.

    Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

    Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

Options:

A.

Privacy audit.

B.

Log collection

C.

Data inventory.

D.

Data classification.

Buy Now
Questions 17

Which of the following entities would most likely be exempt from complying with the General Data Protection Regulation (GDPR)?

Options:

A.

A South American company that regularly collects European customers’ personal data.

B.

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.

C.

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.

D.

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.

Buy Now
Questions 18

Combining multiple pieces of information about an individual to produce a whole that is greater than the sum of its parts is called?

Options:

A.

Identification.

B.

Insecurity.

C.

Aggregation.

D.

Exclusion.

Buy Now
Questions 19

A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?

Options:

A.

Explicit.

B.

Implicit.

C.

Specific

D.

Valid.

Buy Now
Questions 20

What is the potential advantage of homomorphic encryption?

Options:

A.

Encrypted information can be analyzed without decrypting it first.

B.

Ciphertext size decreases as the security level increases.

C.

It allows greater security and faster processing times.

D.

It makes data impenetrable to attacks.

Buy Now
Questions 21

Which of these actions is NOT generally part of the responsibility of an IT or software engineer?

Options:

A.

Providing feedback on privacy policies.

B.

Implementing multi-factor authentication.

C.

Certifying compliance with security and privacy law.

D.

Building privacy controls into the organization’s IT systems or software.

Buy Now
Questions 22

Value sensitive design focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Buy Now
Questions 23

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which regulation most likely applies to the data stored by Berry Country Regional Medical Center?

Options:

A.

Personal Information Protection and Electronic Documents Act

B.

Health Insurance Portability and Accountability Act

C.

The Health Records Act 2001

D.

The European Union Directive 95/46/EC

Buy Now
Questions 24

Which technique is most likely to facilitate the deletion of every instance of data associated with a deleted user account from every data store held by an organization?

Options:

A.

Auditing the code which deletes user accounts.

B.

Building a standardized and documented retention program for user data deletion.

C.

Monitoring each data store for presence of data associated with the deleted user account.

D.

Training engineering teams on the importance of deleting user accounts their associated data from all data stores when requested.

Buy Now
Questions 25

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What should Finley Motors have done to incorporate the transparency principle of Privacy by Design (PbD)?

Options:

A.

Signed a data sharing agreement with AMP Payment Resources.

B.

Documented that Finley Motors has a legitimate interest to share Chuck’s information.

C.

Obtained verbal consent from Chuck and recorded it within internal systems.

D.

Provided notice of data sharing practices within the electronically signed rental agreement.

Buy Now
Questions 26

Which of the following suggests the greatest degree of transparency?

Options:

A.

A privacy disclosure statement clearly articulates general purposes for collection

B.

The data subject has multiple opportunities to opt-out after collection has occurred.

C.

A privacy notice accommodates broadly defined future collections for new products.

D.

After reading the privacy notice, a data subject confidently infers how her information will be used.

Buy Now
Questions 27

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?

Options:

A.

Symmetric Encryption

B.

Tokenization

C.

Obfuscation

D.

Certificates

Buy Now
Questions 28

What is the main benefit of using a private cloud?

Options:

A.

The ability to use a backup system for personal files.

B.

The ability to outsource data support to a third party.

C.

The ability to restrict data access to employees and contractors.

D.

The ability to cut costs for storing, maintaining, and accessing data.

Buy Now
Questions 29

Under the Family Educational Rights and Privacy Act (FERPA), releasing personally identifiable information from a student's educational record requires written permission from the parent or eligible student in order for information to be?

Options:

A.

Released to a prospective employer.

B.

Released to schools to which a student is transferring.

C.

Released to specific individuals for audit or evaluation purposes.

D.

Released in response to a judicial order or lawfully ordered subpoena.

Buy Now
Questions 30

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

Options:

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Buy Now
Questions 31

What distinguishes a "smart" device?

Options:

A.

It can perform multiple data functions simultaneously.

B.

It is programmable by a user without specialized training.

C.

It can reapply access controls stored in its internal memory.

D.

It augments its intelligence with information from the internet.

Buy Now
Questions 32

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Based on the current features of the fitness watch, what would you recommend be implemented into each device in order to most effectively ensure privacy?

Options:

A.

Hashing.

B.

A2DP Bluetooth profile.

C.

Persistent unique identifier.

D.

Randomized MAC address.

Buy Now
Questions 33

Which of the following is one of the fundamental principles of information security?

Options:

A.

Accountability.

B.

Accessibility.

C.

Confidentiality.

D.

Connectivity.

Buy Now
Questions 34

Which of the following is NOT relevant to a user exercising their data portability rights?

Options:

A.

Notice and consent for the downloading of data.

B.

Detection of phishing attacks against the portability interface.

C.

Re-authentication of an account, including two-factor authentication as appropriate.

D.

Validation of users with unauthenticated identifiers (e.g. IP address, physical address).

Buy Now
Questions 35

Which of the following is NOT a factor to consider in FAIR analysis?

Options:

A.

The severity of the harm that might be caused by the privacy risk.

B.

The capability of a threat actor to exploit the analyzed privacy risk.

C.

The stage of the data life cycle in which the analyzed privacy risk occurs.

D.

The probability that a threat actor's attempts to exploit a privacy risk might succeed.

Buy Now
Questions 36

A privacy engineer reviews a newly developed on-line registration page on a company’s website. The purpose of the page is to enable corporate customers to submit a returns / refund request for physical goods. The page displays the following data capture fields: company name, account reference, company address, contact name, email address, contact phone number, product name, quantity, issue description and company bank account details.

After her review, the privacy engineer recommends setting certain capture fields as “non-mandatory”. Setting which of the following fields as “non-mandatory” would be the best example of the principle of data minimization?

Options:

A.

The contact phone number field.

B.

The company address and name.

C.

The contact name and email address.

D.

The company bank account detail field.

Buy Now
Questions 37

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

An individual with an RFID receiver can track people or consumer products.

B.

An individual can scramble computer transmissions in weapons systems.

C.

An individual can use an RFID receiver to engage in video surveillance.

D.

An individual can tap mobile phone communications.

Buy Now
Questions 38

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

Options:

A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Buy Now
Questions 39

An individual drives to the grocery store for dinner. When she arrives at the store, she receives several unsolicited notifications on

her phone about discounts on items at the grocery store she is about to shop at. Which type of privacy problem does the represent?

Options:

A.

Intrusion.

B.

Surveillance.

C.

Decisional Interference.

D.

Exposure.

Buy Now
Questions 40

How can a hacker gain control of a smartphone to perform remote audio and video surveillance?

Options:

A.

By performing cross-site scripting.

B.

By installing a roving bug on the phone.

C.

By manipulating geographic information systems.

D.

By accessing a phone's global positioning system satellite signal.

Buy Now
Questions 41

Which of the following is the best method to minimize tracking through the use of cookies?

Options:

A.

Use ‘private browsing’ mode and delete checked files, clear cookies and cache once a day.

B.

Install a commercially available third-party application on top of the browser that is already installed.

C.

Install and use a web browser that is advertised as ‘built specifically to safeguard user privacy’.

D.

Manage settings in the browser to limit the use of cookies and remove them once the session completes.

Buy Now
Questions 42

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Why is Jordan’s claim that the company does not collect personal information as identified by the GDPR inaccurate?

Options:

A.

The potential customers must browse for products online.

B.

The fitness trackers capture sleep and heart rate data to monitor an individual’s behavior.

C.

The website collects the customers’ and users’ region and country information.

D.

The customers must pair their fitness trackers to either smartphones or computers.

Buy Now
Questions 43

Machine-learning based solutions present a privacy risk because?

Options:

A.

Training data used during the training phase is compromised.

B.

The solution may contain inherent bias from the developers.

C.

The decision-making process used by the solution is not documented.

D.

Machine-learning solutions introduce more vulnerabilities than other software.

Buy Now
Questions 44

A privacy technologist has been asked to aid in a forensic investigation on the darknet following the compromise of a company's personal data. This will primarily involve an understanding of which of the following privacy-preserving techniques?

Options:

A.

Encryption

B.

Do Not Track

C.

Masking

D.

Tokenization

Buy Now
Questions 45

Which concept related to privacy choice is demonstrated by highlighting and bolding the "accept" button on a cookies notice while maintaining standard text format for other options?

Options:

A.

Illuminating

B.

Nudging

C.

Suppression

D.

Tagging

Buy Now
Questions 46

Which of the following is a privacy consideration for NOT sending large-scale SPAM type emails to a database of email addresses?

Options:

A.

Poor user experience.

B.

Emails are unsolicited.

C.

Data breach notification.

D.

Reduction in email deliverability score.

Buy Now
Questions 47

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

The location data collected and displayed on the map should be changed for which of the following reasons?

Options:

A.

The blurriness does not allow users to know how close they are to an infected person

B.

The radius used for location data exceeds official social distancing rules

C.

The location data has not been pseudonymized

D.

The location data is loo precise

Buy Now
Questions 48

A credit card with the last few numbers visible is an example of what?

Options:

A.

Masking data

B.

Synthetic data

C.

Sighting controls.

D.

Partial encryption

Buy Now
Questions 49

After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation:

Statement 1 reads: “Please check this box to confirm you have read and accept the terms and conditions of the end user license agreement” and includes a hyperlink to the terms and conditions.

Statement 2 reads: “Please check this box to confirm you have read and understood the privacy notice” and includes a hyperlink to the privacy notice.

Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?

Options:

A.

Consent.

B.

Vital interests.

C.

Legal obligation.

D.

Legitimate interests.

Buy Now
Questions 50

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?

Options:

A.

Develop a technical privacy framework that integrates with the development lifecycle.

B.

Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.

C.

Identify the privacy requirements as a part of the Privacy Impact Assessment (PIA) process during development and evaluation stages.

D.

Develop training programs that aid the developers in understanding how to turn privacy requirements into actionable code and design level specifications.

Buy Now
Questions 51

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

What is the best way to minimize the risk of an exposure violation through the use of the app?

Options:

A.

Prevent the downloading of photos stored in the app.

B.

Dissociate the patient health data from the personal data.

C.

Exclude the collection of personal information from the health record.

D.

Create a policy to prevent combining data with external data sources.

Buy Now
Questions 52

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

Options:

A.

Server driven controls.

B.

Cloud computing

C.

Data on demand

D.

MAC filtering

Buy Now
Questions 53

A key principle of an effective privacy policy is that it should be?

Options:

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Buy Now
Questions 54

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

Options:

A.

Categorization.

B.

Remediation.

C.

Retention.

D.

Security

Buy Now
Questions 55

An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls.

Before implementation, a privacy technologist should conduct which of the following?

Options:

A.

A Data Protection Impact Assessment (DPIA) and consultation with the appropriate regulator to ensure legal compliance.

B.

A privacy risk and impact assessment to evaluate potential risks from the proposed processing operations.

C.

A Legitimate Interest Assessment (LIA) to ensure that the processing is proportionate and does not override the privacy, rights and freedoms of the customers.

D.

A security assessment of the help desk solution and provider to assess if the technology was developed with a security by design approach.

Buy Now
Questions 56

Which of the following is NOT a workplace surveillance best practice?

Options:

A.

Check local privacy laws before putting surveillance in place.

B.

Ensure surveillance is discreet so employees do not alter their behavior.

C.

Once surveillance data has been gathered, limit exposure of the content.

D.

Ensure the minimal amount of surveillance is performed to meet the objective.

Buy Now
Questions 57

What is an example of a just-in-time notice?

Options:

A.

A warning that a website may be unsafe.

B.

A full organizational privacy notice publicly available on a website

C.

A credit card company calling a user to verify a purchase before itis authorized

D.

Privacy information given to a user when he attempts to comment on an online article.

Buy Now
Questions 58

During a transport layer security (TLS) session, what happens immediately after the web browser creates a random PreMasterSecret?

Options:

A.

The server decrypts the PremasterSecret.

B.

The web browser opens a TLS connection to the PremasterSecret.

C.

The web browser encrypts the PremasterSecret with the server's public key.

D.

The server and client use the same algorithm to convert the PremasterSecret into an encryption key.

Buy Now
Questions 59

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

What would be the best way to supervise the third-party systems the EnsureClaim App will share data with?

Options:

A.

Review the privacy notices for each third-party that the app will share personal data with to determine adequate privacy and data protection controls are in place.

B.

Conduct a security and privacy review before onboarding new vendors that collect personal data from the app.

C.

Anonymize all personal data collected by the app before sharing any data with third-parties.

D.

Develop policies and procedures that outline how data is shared with third-party apps.

Buy Now
Questions 60

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

CIPT Question 60

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

Considering that LeadOps will host/process personal information on behalf of Clean-Q remotely, what is an appropriate next step for Clean-Q senior management to assess LeadOps' appropriateness?

Options:

A.

Nothing at this stage as the Managing Director has made a decision.

B.

Determine if any Clean-Q competitors currently use LeadOps as a solution.

C.

Obtain a legal opinion from an external law firm on contracts management.

D.

Involve the Information Security team to understand in more detail the types of services and solutions LeadOps is proposing.

Buy Now
Questions 61

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

When initially collecting personal information from customers, what should Jane be guided by?

Options:

A.

Onward transfer rules.

B.

Digital rights management.

C.

Data minimization principles.

D.

Vendor management principles

Buy Now
Questions 62

A jurisdiction requiring an organization to place a link on the website that allows a consumer to opt-out of sharing is an example of what type of requirement?

Options:

A.

Functional

B.

Operational

C.

Technical

D.

Use case

Buy Now
Questions 63

Which of the following is the least effective privacy preserving practice in the Systems Development Life Cycle (SDLC)?

Options:

A.

Conducting privacy threat modeling for the use-case.

B.

Following secure and privacy coding standards in the development.

C.

Developing data flow modeling to identify sources and destinations of sensitive data.

D.

Reviewing the code against Open Web Application Security Project (OWASP) Top 10 Security Risks.

Buy Now
Questions 64

How does browser fingerprinting compromise privacy?

Options:

A.

By creating a security vulnerability.

B.

By differentiating users based upon parameters.

C.

By persuading users to provide personal information.

D.

By customizing advertising based on the geographic location.

Buy Now
Questions 65

What is typically NOT performed by sophisticated Access Management (AM) techniques?

Options:

A.

Restricting access to data based on location.

B.

Restricting access to data based on user role.

C.

Preventing certain types of devices from accessing data.

D.

Preventing data from being placed in unprotected storage.

Buy Now
Questions 66

Which of the following would best improve an organization’ s system of limiting data use?

Options:

A.

Implementing digital rights management technology.

B.

Confirming implied consent for any secondary use of data.

C.

Applying audit trails to resources to monitor company personnel.

D.

Instituting a system of user authentication for company personnel.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist
Last Update: Nov 29, 2024
Questions: 220

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now CIPT testing engine

PDF (Q&A)

$42  $104.99
buy now CIPT pdf