Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CIPT Leak Questions

Page: 16 / 17
Total 220 questions

Certified Information Privacy Technologist Questions and Answers

Question 61

Value sensitive design focuses on which of the following?

Options:

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Question 62

Which of the following is NOT a workplace surveillance best practice?

Options:

A.

Check local privacy laws before putting surveillance in place.

B.

Ensure surveillance is discreet so employees do not alter their behavior.

C.

Once surveillance data has been gathered, limit exposure of the content.

D.

Ensure the minimal amount of surveillance is performed to meet the objective.

Question 63

Which of the following is considered a records management best practice?

Options:

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Question 64

Which of the following techniques describes the use of encryption where encryption keys are divided into parts that can then be used to recover a full encryption key?

Options:

A.

Homomorphic encryption.

B.

Asymmetric cryptography.

C.

Cryptographic hashing.

D.

Secret sharing.

Page: 16 / 17
Total 220 questions