New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Information Privacy Technologist CIPT Dumps PDF

Page: 13 / 17
Total 220 questions

Certified Information Privacy Technologist Questions and Answers

Question 49

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

Options:

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Question 50

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

Which question would you most likely ask to gain more insight about LeadOps and provide practical privacy recommendations?

Options:

A.

What is LeadOps’ annual turnover?

B.

How big is LeadOps’ employee base?

C.

Where are LeadOps' operations and hosting services located?

D.

Does LeadOps practice agile development and maintenance of their system?

Question 51

Which of the following modes of interaction often target both people who personally know and are strangers to the attacker?

Options:

A.

Spam.

B.

Phishing.

C.

Unsolicited sexual imagery.

D.

Consensually-shared sexual imagery.

Question 52

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

Options:

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Page: 13 / 17
Total 220 questions