Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the IAPP Information Privacy Technologist CIPT Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam CIPT Premium Access

View all detail and faqs for the CIPT exam


770 Students Passed

90% Average Score

96% Same Questions
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

What would be the best way to supervise the third-party systems the EnsureClaim App will share data with?

Options:

A.

Review the privacy notices for each third-party that the app will share personal data with to determine adequate privacy and data protection controls are in place.

B.

Conduct a security and privacy review before onboarding new vendors that collect personal data from the app.

C.

Anonymize all personal data collected by the app before sharing any data with third-parties.

D.

Develop policies and procedures that outline how data is shared with third-party apps.

Questions # 42:

A valid argument against data minimization is that it?

Options:

A.

Can limit business opportunities.

B.

Decreases the speed of data transfers.

C.

Can have an adverse effect on data quality.

D.

Increases the chance that someone can be identified from data.

Questions # 43:

All of the following topics should be included in a workplace surveillance policy EXCEPT?

Options:

A.

Who can be tracked and when.

B.

Who can access surveillance data.

C.

What areas can be placed under surveillance.

D.

Who benefits from collecting surveillance data.

Questions # 44:

What is the main function of a breach response center?

Options:

A.

Detecting internal security attacks.

B.

Addressing privacy incidents.

C.

Providing training to internal constituencies.

D.

Interfacing with privacy regulators and governmental bodies.

Questions # 45:

A key principle of an effective privacy policy is that it should be?

Options:

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Questions # 46:

An organization's customers have suffered a number of data breaches through successful social engineering attacks. One potential solution to remediate and prevent future occurrences would be to implement which of the following?

Options:

A.

Differential identifiability.

B.

Multi-factor authentication.

C.

Greater password complexity.

D.

Attribute-based access control.

Questions # 47:

A jurisdiction requiring an organization to place a link on the website that allows a consumer to opt-out of sharing is an example of what type of requirement?

Options:

A.

Functional

B.

Operational

C.

Technical

D.

Use case

Questions # 48:

What would be an example of an organization transferring the risks associated with a data breach?

Options:

A.

Using a third-party service to process credit card transactions.

B.

Encrypting sensitive personal data during collection and storage

C.

Purchasing insurance to cover the organization in case of a breach.

D.

Applying industry standard data handling practices to the organization’ practices.

Questions # 49:

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?

Options:

A.

Verify that WebTracker's HR and Payroll systems implement the current privacy notice (after the typos are fixed).

B.

Review the list of subcontractors employed by AmaZure and ensure these are included in the formal agreement with WebTracker.

C.

Evaluate and review the basis for processing employees’ personal data in the context of the prototype created by WebTracker and approved by the CEO.

D.

Confirm whether the data transfer from London to the USA has been fully approved by AmaZure and the appropriate institutions in the USA and the European Union.

Questions # 50:

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Ted's implementation is most likely a response to what incident?

Options:

A.

Encryption keys were previously unavailable to the organization's cloud storage host.

B.

Signatureless advanced malware was detected at multiple points on the organization's networks.

C.

Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network.

D.

Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor.

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.