Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Download Full Version CIPT IAPP Exam

Page: 15 / 17
Total 220 questions

Certified Information Privacy Technologist Questions and Answers

Question 57

After stringent testing an organization has launched a new web-facing ordering system for its consumer medical products. As the medical products could provide indicators of health conditions, the organization could further strengthen its privacy controls by deploying?

Options:

A.

Run time behavior monitoring.

B.

A content delivery network.

C.

Context aware computing.

D.

Differential identifiability.

Question 58

There are two groups of users. In a company, where one group Is allowed to see credit card numbers, while the other group Is not. Both are accessing the data through the same application. The most effective and efficient way to achieve this would be?

Options:

A.

Have two copies of the data, one copy where the credit card numbers are obfuscated, while the other copy has them in the clear. Serve up from

the appropriate copy depending on the user accessing it.

B.

Have the data encrypted at rest, and selectively decrypt It for the users who have the rights to see it.

C.

Obfuscate the credit card numbers whenever a user who does not have the right to see them accesses the data.

D.

Drop credit card numbers altogether whenever a user who does not have the right to see them accesses the data.

Question 59

Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?

Options:

A.

Express consent.

B.

Implied consent.

C.

Informed notice.

D.

Authorized notice.

Question 60

Which of the following is NOT a factor to consider in FAIR analysis?

Options:

A.

The severity of the harm that might be caused by the privacy risk.

B.

The capability of a threat actor to exploit the analyzed privacy risk.

C.

The stage of the data life cycle in which the analyzed privacy risk occurs.

D.

The probability that a threat actor's attempts to exploit a privacy risk might succeed.

Page: 15 / 17
Total 220 questions