New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium IAPP CIPT Dumps Questions Answers

Page: 1 / 17
Total 220 questions

Certified Information Privacy Technologist Questions and Answers

Question 1

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?

Options:

A.

Cloud file transfer services.

B.

Certificate Authority (CA).

C.

HyperText Transfer Protocol (HTTP).

D.

Transport Layer Security (TLS).

Buy Now
Question 2

An organization is reliant on temporary contractors for performing data analytics and they require access to personal data via software-as-a-service to perform their job. When the temporary contractor completes their work assignment, what woul^.be the most effective way to safeguard privacy and access to personal data when they leave?

Options:

A.

Set a system-based expiry that requires management reauthorization for online access for accounts that have been active more than 6 months.

B.

Establish a predetermined automatic account expiration date based on contract timescales.

C.

Require temporary contractors to sign a non-disclosure agreement, security acceptable use policy, and online access authorizations by hiring managers.

D.

Mandate hiring managers to email IT or Security team when the contractor leaves.

Question 3

In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?

Options:

A.

The size of the data.

B.

The format of the data.

C.

The range of the data.

D.

The medium of the data.

Question 4

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

An individual with an RFID receiver can track people or consumer products.

B.

An individual can scramble computer transmissions in weapons systems.

C.

An individual can use an RFID receiver to engage in video surveillance.

D.

An individual can tap mobile phone communications.

Question 5

Not updating software for a system that processes human resources data with the latest security patches may create what?

Options:

A.

Authentication issues.

B.

Privacy vulnerabilities.

C.

Privacy threat vectors.

D.

Reportable privacy violations.

Question 6

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

The location data collected and displayed on the map should be changed for which of the following reasons?

Options:

A.

The blurriness does not allow users to know how close they are to an infected person

B.

The radius used for location data exceeds official social distancing rules

C.

The location data has not been pseudonymized

D.

The location data is loo precise

Question 7

Which of the following is one of the fundamental principles of information security?

Options:

A.

Accountability.

B.

Accessibility.

C.

Confidentiality.

D.

Connectivity.

Question 8

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

How can Finley Motors reduce the risk associated with transferring Chuck’s personal information to AMP Payment Resources?

Options:

A.

By providing only the minimum necessary data to process the violation notice and masking all other information prior to transfer.

B.

By requesting AMP Payment Resources delete unnecessary datasets and only utilize what is necessary to process the violation notice.

C.

By obfuscating the minimum necessary data to process the violation notice and require AMP Payment Resources to secure store the personal information.

D.

By transferring all information to separate datafiles and requiring AMP Payment Resources to combine the datasets during processing of the violation notice.

Question 9

An organization is evaluating a number of Machine Learning (ML) solutions to help automate a customer-facing part of its business From a privacy perspective, the organization should first?

Options:

A.

Define their goals for fairness

B.

Document the distribution of bias scores

C.

Document the False Positive Rates (FPR).

D.

Define how data subjects may object to the processing

Question 10

Which of the following methods does NOT contribute to keeping the data confidential?

Options:

A.

Differential privacy.

B.

Homomorphic encryption.

C.

K-anonymity.

D.

Referential integrity.

Question 11

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

Options:

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Question 12

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) for the new Light Blue Health application currently in development. Which of the following best describes a risk that is likely to result in a privacy breach?

Options:

A.

Limiting access to the app to authorized personnel.

B.

Including non-transparent policies, terms and conditions in the app.

C.

Insufficiently deleting personal data after an account reaches its retention period.

D.

Not encrypting the health record when it is transferred to the Light Blue Health servers.

Question 13

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

Options:

A.

Implementing a mandatory privacy review and legal approval process.

B.

Obtain leadership buy-in for a mandatory privacy review and approval process.

C.

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.

D.

Conduct annual Privacy by Design training and refreshers for all impacted personnel.

Question 14

A privacy engineer reviews a newly developed on-line registration page on a company’s website. The purpose of the page is to enable corporate customers to submit a returns / refund request for physical goods. The page displays the following data capture fields: company name, account reference, company address, contact name, email address, contact phone number, product name, quantity, issue description and company bank account details.

After her review, the privacy engineer recommends setting certain capture fields as “non-mandatory”. Setting which of the following fields as “non-mandatory” would be the best example of the principle of data minimization?

Options:

A.

The contact phone number field.

B.

The company address and name.

C.

The contact name and email address.

D.

The company bank account detail field.

Question 15

it Is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

Options:

A.

Breaches of an individual's data.

B.

Illicit collection of personal data.

C.

Manipulation of a user's choice.

D.

Discrimination from profiling.

Question 16

Which of the following would best improve an organization’ s system of limiting data use?

Options:

A.

Implementing digital rights management technology.

B.

Confirming implied consent for any secondary use of data.

C.

Applying audit trails to resources to monitor company personnel.

D.

Instituting a system of user authentication for company personnel.

Question 17

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

Options:

A.

The data and recipients for medical research are not specified

B.

Insufficient information is provided on notifications and infection alerts

C.

The sharing of information with an affiliated healthcare provider is too risky

D.

Allowing users to share risk result information for exposure and contact tracing purposes

Question 18

A vendor has been collecting data under an old contract, not aligned with the practices of the organization.

Which is the preferred response?

Options:

A.

Destroy the data

B.

Update the contract to bring the vendor into alignment.

C.

Continue the terms of the existing contract until it expires.

D.

Terminate the contract and begin a vendor selection process.

Question 19

An organization is launching a new online subscription-based publication. As the service is not aimed at children, users are asked for their date of birth as part of the of the sign-up process. The privacy technologist suggests it may be more appropriate ask if an individual is over 18 rather than requiring they provide a date of birth. What kind of threat is the privacy technologist concerned about?

Options:

A.

Identification.

B.

Insecurity.

C.

Interference.

D.

Minimization.

Question 20

Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India. The Aadhaar database contains the Aadhaar number, name, date of birth, gender and address of over 1 billion individuals.

Which of the following datasets derived from that data would be considered the most de-identified?

Options:

A.

A count of the years of birth and hash of the person’ s gender.

B.

A count of the month of birth and hash of the person's first name.

C.

A count of the day of birth and hash of the person’s first initial of their first name.

D.

Account of the century of birth and hash of the last 3 digits of the person's Aadhaar number.

Question 21

Which of the following statements is true regarding software notifications and agreements?

Options:

A.

Website visitors must view the site’s privacy statement before downloading software.

B.

Software agreements are designed to be brief, while notifications provide more details.

C.

It is a good practice to provide users with information about privacy prior to software installation.

D.

“Just in time” software agreement notifications provide users with a final opportunity to modify the agreement.

Question 22

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

Why would you recommend that GFC use record encryption rather than disk, file or table encryption?

Options:

A.

Record encryption is asymmetric, a stronger control measure.

B.

Record encryption is granular, limiting the damage of potential breaches.

C.

Record encryption involves tag masking, so its metadata cannot be decrypted

D.

Record encryption allows for encryption of personal data only.

Question 23

Which of the following are the mandatory pieces of information to be included in the documentation of records of processing activities for an organization that processes personal data on behalf of another organization?

Options:

A.

Copies of the consent forms from each data subject.

B.

Time limits for erasure of different categories of data.

C.

Contact details of the processor and Data Protection Offer (DPO).

D.

Descriptions of the processing activities and relevant data subjects.

Question 24

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the strongest method for authenticating Chuck’s identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

Options:

A.

By requiring Chuck use the last 4 digits of his driver’s license number in combination with a unique PIN provided within the violation notice.

B.

By requiring Chuck use his credit card number in combination with the last 4 digits of his driver’s license.

C.

By requiring Chuck use the rental agreement number in combination with his email address.

D.

By requiring Chuck to call AMP Payment Resources directly and provide his date of birth and home address.

Question 25

You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?

Options:

A.

Remnant.

B.

Behavioral.

C.

Contextual.

D.

Demographic.

Question 26

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Why is Jordan’s claim that the company does not collect personal information as identified by the GDPR inaccurate?

Options:

A.

The potential customers must browse for products online.

B.

The fitness trackers capture sleep and heart rate data to monitor an individual’s behavior.

C.

The website collects the customers’ and users’ region and country information.

D.

The customers must pair their fitness trackers to either smartphones or computers.

Question 27

A user who owns a resource wants to give other individuals access to the resource. What control would apply?

Options:

A.

Mandatory access control.

B.

Role-based access controls.

C.

Discretionary access control.

D.

Context of authority controls.

Question 28

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

Options:

A.

Verifying the accuracy of the data by contacting users.

B.

Validating the company’s data collection procedures.

C.

Introducing erroneous data to see if its detected.

D.

Tracking changes to data through auditing.

Question 29

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:

A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Question 30

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

What is a key consideration for assessing external service providers like LeadOps, which will conduct personal information processing operations on Clean-Q's behalf?

Options:

A.

Understanding LeadOps’ costing model.

B.

Establishing a relationship with the Managing Director of LeadOps.

C.

Recognizing the value of LeadOps’ website holding a verified security certificate.

D.

Obtaining knowledge of LeadOps' information handling practices and information security environment.

Question 31

How should the sharing of information within an organization be documented?

Options:

A.

With a binding contract.

B.

With a data flow diagram.

C.

With a disclosure statement.

D.

With a memorandum of agreement.

Question 32

What can be used to determine the type of data in storage without exposing its contents?

Options:

A.

Collection records.

B.

Data mapping.

C.

Server logs.

D.

Metadata.

Question 33

Which of the following is most important to provide to the data subject before the collection phase of the data lifecycle?

Options:

A.

Privacy Notice.

B.

Disclosure Policy.

C.

Consent Request.

D.

Data Protection Policy.

Question 34

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?

Options:

A.

Configuring the environment to use shorter error messages.

B.

Handing exceptions internally and not displaying errors to the user.

C.

Creating default error pages or error messages which do not include variable data.

D.

Logging the session name and necessary parameters once the error occurs to enable trouble shooting.

Question 35

What was the first privacy framework to be developed?

Options:

A.

OECD Privacy Principles.

B.

Generally Accepted Privacy Principles.

C.

Code of Fair Information Practice Principles (FIPPs).

D.

The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.

Question 36

After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation:

Statement 1 reads: “Please check this box to confirm you have read and accept the terms and conditions of the end user license agreement” and includes a hyperlink to the terms and conditions.

Statement 2 reads: “Please check this box to confirm you have read and understood the privacy notice” and includes a hyperlink to the privacy notice.

Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?

Options:

A.

Consent.

B.

Vital interests.

C.

Legal obligation.

D.

Legitimate interests.

Question 37

What tactic does pharming use to achieve its goal?

Options:

A.

It modifies the user's Hosts file.

B.

It encrypts files on a user's computer.

C.

It creates a false display advertisement.

D.

It generates a malicious instant message.

Question 38

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

    Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

    The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

    DES is the strongest encryption algorithm currently used for any file.

    Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

    Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

Options:

A.

Privacy audit.

B.

Log collection

C.

Data inventory.

D.

Data classification.

Question 39

Which of the following functionalities can meet some of the General Data Protection Regulation’s (GDPR’s) Data Portability requirements for a social networking app designed for users in the EU?

Options:

A.

Allow users to modify the data they provided the app.

B.

Allow users to delete the content they provided the app.

C.

Allow users to download the content they have provided the app.

D.

Allow users to get a time-stamped list of what they have provided the app.

Question 40

What would be an example of an organization transferring the risks associated with a data breach?

Options:

A.

Using a third-party service to process credit card transactions.

B.

Encrypting sensitive personal data during collection and storage

C.

Purchasing insurance to cover the organization in case of a breach.

D.

Applying industry standard data handling practices to the organization’ practices.

Question 41

Which of the following statements describes an acceptable disclosure practice?

Options:

A.

An organization’s privacy policy discloses how data will be used among groups within the organization itself.

B.

With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.

C.

Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.

D.

When an organization discloses data to a vendor, the terms of the vendor’ privacy notice prevail over the organization’ privacy notice.

Question 42

When should code audits be concluded?

Options:

A.

At code check-in time.

B.

At engineering design time.

C.

While code is being sent to production.

D.

Before launch after all code for a feature is complete.

Question 43

Which is NOT a suitable action to apply to data when the retention period ends?

Options:

A.

Aggregation.

B.

De-identification.

C.

Deletion.

D.

Retagging.

Question 44

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

What is the best way to ensure that the application only collects personal data that is needed to fulfill its primary purpose of providing potential medical and healthcare recommendations?

Options:

A.

Obtain consent before using personal health information for data analytics purposes.

B.

Provide the user with an option to select which personal data the application may collect.

C.

Disclose what personal data the application the collecting in the company Privacy Policy posted online.

D.

Document each personal category collected by the app and ensure it maps to an app function or feature.

Question 45

A privacy engineer has been asked to review an online account login page. He finds there is no limitation on the number of invalid login attempts a user can make when logging into their online account.

What would be the best recommendation to minimize the potential privacy risk from this weakness?

Options:

A.

Implement a CAPTCHA system.

B.

Develop server-side input validation checks.

C.

Enforce strong password and account credentials.

D.

Implement strong Transport Layer Security (TLS) to ensure an encrypted link.

Question 46

Granting data subjects the right to have data corrected, amended, or deleted describes?

Options:

A.

Use limitation.

B.

Accountability.

C.

A security safeguard

D.

Individual participation

Question 47

Which of the following best describes the basic concept of "Privacy by Design?"

Options:

A.

The adoption of privacy enhancing technologies.

B.

The integration of a privacy program with all lines of business.

C.

The implementation of privacy protection through system architecture.

D.

The introduction of business process to identify and assess privacy gaps.

Question 48

What is an example of a just-in-time notice?

Options:

A.

A warning that a website may be unsafe.

B.

A full organizational privacy notice publicly available on a website

C.

A credit card company calling a user to verify a purchase before itis authorized

D.

Privacy information given to a user when he attempts to comment on an online article.

Question 49

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

Options:

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Question 50

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

Which question would you most likely ask to gain more insight about LeadOps and provide practical privacy recommendations?

Options:

A.

What is LeadOps’ annual turnover?

B.

How big is LeadOps’ employee base?

C.

Where are LeadOps' operations and hosting services located?

D.

Does LeadOps practice agile development and maintenance of their system?

Question 51

Which of the following modes of interaction often target both people who personally know and are strangers to the attacker?

Options:

A.

Spam.

B.

Phishing.

C.

Unsolicited sexual imagery.

D.

Consensually-shared sexual imagery.

Question 52

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

Options:

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Question 53

Which of the following CANNOT be effectively determined during a code audit?

Options:

A.

Whether access control logic is recommended in all cases.

B.

Whether data is being incorrectly shared with a third-party.

C.

Whether consent is durably recorded in the case of a server crash.

D.

Whether the differential privacy implementation correctly anonymizes data.

Question 54

of the following best describes a network threat model and Its uses?

Options:

A.

It Is used in software development to detect programming errors. .

B.

It is a risk-based model used to calculate the probabilities of risks identified during vulnerability tests.

C.

It helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.

D.

It combines the results of vulnerability and penetration tests to provide useful insights into the network's overall threat and security posture.

Question 55

What element is most conducive to fostering a sound privacy by design culture in an organization?

Options:

A.

Ensuring all employees acknowledge and understood the privacy policy.

B.

Frequent privacy and security awareness training for employees.

C.

Monthly reviews of organizational privacy principles.

D.

Gaining advocacy from senior management.

Question 56

Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?

Options:

A.

A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain level, it flashes a message about new themes released that day.

B.

An interactive toy copies a child’s behavior through gestures and kid-friendly sounds. It runs on battery power and automatically connects to a base station at home to charge itself.

C.

A math tutoring service commissioned an advertisement on a bulletin board inside a charter school. The service makes it simple to reach out to tutors through a QR-code shaped like a cartoon character.

D.

A note-taking application converts hard copies of kids’ class notes into audio books in seconds. It does so by using the processing power of idle server farms.

Question 57

After stringent testing an organization has launched a new web-facing ordering system for its consumer medical products. As the medical products could provide indicators of health conditions, the organization could further strengthen its privacy controls by deploying?

Options:

A.

Run time behavior monitoring.

B.

A content delivery network.

C.

Context aware computing.

D.

Differential identifiability.

Question 58

There are two groups of users. In a company, where one group Is allowed to see credit card numbers, while the other group Is not. Both are accessing the data through the same application. The most effective and efficient way to achieve this would be?

Options:

A.

Have two copies of the data, one copy where the credit card numbers are obfuscated, while the other copy has them in the clear. Serve up from

the appropriate copy depending on the user accessing it.

B.

Have the data encrypted at rest, and selectively decrypt It for the users who have the rights to see it.

C.

Obfuscate the credit card numbers whenever a user who does not have the right to see them accesses the data.

D.

Drop credit card numbers altogether whenever a user who does not have the right to see them accesses the data.

Question 59

Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?

Options:

A.

Express consent.

B.

Implied consent.

C.

Informed notice.

D.

Authorized notice.

Question 60

Which of the following is NOT a factor to consider in FAIR analysis?

Options:

A.

The severity of the harm that might be caused by the privacy risk.

B.

The capability of a threat actor to exploit the analyzed privacy risk.

C.

The stage of the data life cycle in which the analyzed privacy risk occurs.

D.

The probability that a threat actor's attempts to exploit a privacy risk might succeed.

Question 61

Value sensitive design focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Question 62

Which of the following is NOT a workplace surveillance best practice?

Options:

A.

Check local privacy laws before putting surveillance in place.

B.

Ensure surveillance is discreet so employees do not alter their behavior.

C.

Once surveillance data has been gathered, limit exposure of the content.

D.

Ensure the minimal amount of surveillance is performed to meet the objective.

Question 63

Which of the following is considered a records management best practice?

Options:

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Question 64

Which of the following techniques describes the use of encryption where encryption keys are divided into parts that can then be used to recover a full encryption key?

Options:

A.

Homomorphic encryption.

B.

Asymmetric cryptography.

C.

Cryptographic hashing.

D.

Secret sharing.

Question 65

Which of the following would be an example of an "objective" privacy harm to an individual?

Options:

A.

Receiving spam following the sale an of email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Inaccuracies in personal data.

Question 66

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which data lifecycle phase needs the most attention at this Ontario medical center?

Options:

A.

Retention

B.

Disclosure

C.

Collection

D.

Use

Page: 1 / 17
Total 220 questions