New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CIPT Questions and Answers

Question # 6

Which concept related to privacy choice is demonstrated by highlighting and bolding the "accept" button on a cookies notice while maintaining standard text format for other options?

A.

Illuminating

B.

Nudging

C.

Suppression

D.

Tagging

Full Access
Question # 7

A company configures their information system to have the following capabilities:

Allow for selective disclosure of attributes to certain parties, but not to others.

Permit the sharing of attribute references instead of attribute values - such as “I am over 21” instead of birthday date.

Allow for information to be altered or deleted as needed.

These capabilities help to achieve which privacy engineering objective?

A.

Predictability.

B.

Manageability.

C.

Disassociability.

D.

Integrity.

Full Access
Question # 8

When should code audits be concluded?

A.

At code check-in time.

B.

At engineering design time.

C.

While code is being sent to production.

D.

Before launch after all code for a feature is complete.

Full Access
Question # 9

An organization is evaluating a number of Machine Learning (ML) solutions to help automate a customer-facing part of its business From a privacy perspective, the organization should first?

A.

Define their goals for fairness

B.

Document the distribution of bias scores

C.

Document the False Positive Rates (FPR).

D.

Define how data subjects may object to the processing

Full Access
Question # 10

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?

A.

Cloud file transfer services.

B.

Certificate Authority (CA).

C.

HyperText Transfer Protocol (HTTP).

D.

Transport Layer Security (TLS).

Full Access
Question # 11

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

Regarding the app, which action is an example of a decisional interference violation?

A.

The app asks income level to determine the treatment of care.

B.

The app sells aggregated data to an advertising company without prior consent.

C.

The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.

D.

The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual’s symptoms.

Full Access
Question # 12

What is the main issue pertaining to data protection with the use of 'deep fakes'?

A.

Misinformation.

B.

Non-conformity with the accuracy principle.

C.

Issues with establishing non-repudiation.

D.

Issues with confidentiality of the information.

Full Access
Question # 13

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?

A.

Limited-retention, de-identified logs including only metadata.

B.

Limited-retention, de-identified logs including the links clicked in messages as well as metadata.

C.

Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.

D.

Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.

Full Access
Question # 14

What is a main benefit of data aggregation?

A.

It is a good way to perform analysis without needing a statistician.

B.

It applies two or more layers of protection to a single data record.

C.

It allows one to draw valid conclusions from small data samples.

D.

It is a good way to achieve de-identification and unlinkabilty.

Full Access
Question # 15

Many modern vehicles incorporate technologies that increase the convenience of drivers, but collect information about driver behavior in order to Implement this. What should vehicle manufacturers prioritize to ensure enhanced privacy protection for drivers?

A.

Share the sensitive data collected about driver behavior with the driver.

B.

Derive implicit consent for the processing of sensitive data by the continued use of the vehicle.

C.

Obtain affirmative consent for processing of sensitive data about the driver.

D.

Provide easy to read, in-vehicle instructions about how to use the technology.

Full Access
Question # 16

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) for the new Light Blue Health application currently in development. Which of the following best describes a risk that is likely to result in a privacy breach?

A.

Limiting access to the app to authorized personnel.

B.

Including non-transparent policies, terms and conditions in the app.

C.

Insufficiently deleting personal data after an account reaches its retention period.

D.

Not encrypting the health record when it is transferred to the Light Blue Health servers.

Full Access
Question # 17

What is typically NOT performed by sophisticated Access Management (AM) techniques?

A.

Restricting access to data based on location.

B.

Restricting access to data based on user role.

C.

Preventing certain types of devices from accessing data.

D.

Preventing data from being placed in unprotected storage.

Full Access
Question # 18

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

If Clean-Q were to utilize LeadOps' services, what is a contract clause that may be included in the agreement entered into with LeadOps?

A.

A provision that holds LeadOps liable for a data breach involving Clean-Q's information.

B.

A provision prescribing technical and organizational controls that LeadOps must implement.

C.

A provision that requires LeadOps to notify Clean-Q of any suspected breaches of information that involves customer or resource information managed on behalf of Clean-Q.

D.

A provision that allows Clean-Q to conduct audits of LeadOps’ information processing and information security environment, at LeadOps’ cost and at any time that Clean-Q requires.

Full Access
Question # 19

Machine-learning based solutions present a privacy risk because?

A.

Training data used during the training phase is compromised.

B.

The solution may contain inherent bias from the developers.

C.

The decision-making process used by the solution is not documented.

D.

Machine-learning solutions introduce more vulnerabilities than other software.

Full Access
Question # 20

An organization is launching a smart watch which, in addition to alerts, will notify the the wearer of incoming calls allowing them to answer on the device. This convenience also comes with privacy concerns and is an example of?

A.

Value-Sensitive Design.

B.

Ubiquitous computing.

C.

Anthropomorphism.

D.

Coupling

Full Access
Question # 21

A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?

A.

Explicit.

B.

Implicit.

C.

Specific

D.

Valid.

Full Access
Question # 22

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the strongest method for authenticating Chuck’s identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

A.

By requiring Chuck use the last 4 digits of his driver’s license number in combination with a unique PIN provided within the violation notice.

B.

By requiring Chuck use his credit card number in combination with the last 4 digits of his driver’s license.

C.

By requiring Chuck use the rental agreement number in combination with his email address.

D.

By requiring Chuck to call AMP Payment Resources directly and provide his date of birth and home address.

Full Access
Question # 23

UESTION NO: 48

Which is NOT a drawback to using a biometric recognition system?

A.

It can require more maintenance and support.

B.

It can be more expensive than other systems

C.

It has limited compatibility across systems.

D.

It is difficult for people to use.

Full Access
Question # 24

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which technology is best suited for the contact tracing feature of the app1?

A.

Bluetooth

B.

Deep learning

C.

Near Field Communication (NFC)

D.

Radio-Frequency Identification (RFID)

Full Access
Question # 25

How should the sharing of information within an organization be documented?

A.

With a binding contract.

B.

With a data flow diagram.

C.

With a disclosure statement.

D.

With a memorandum of agreement.

Full Access
Question # 26

What distinguishes a "smart" device?

A.

It can perform multiple data functions simultaneously.

B.

It is programmable by a user without specialized training.

C.

It can reapply access controls stored in its internal memory.

D.

It augments its intelligence with information from the internet.

Full Access
Question # 27

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

A.

Categorization.

B.

Remediation.

C.

Retention.

D.

Security

Full Access
Question # 28

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

A.

Encryption.

B.

Access Controls.

C.

De-identification.

D.

Multi-factor authentication.

Full Access
Question # 29

What can be used to determine the type of data in storage without exposing its contents?

A.

Collection records.

B.

Data mapping.

C.

Server logs.

D.

Metadata.

Full Access
Question # 30

What is the main function of a breach response center?

A.

Detecting internal security attacks.

B.

Addressing privacy incidents.

C.

Providing training to internal constituencies.

D.

Interfacing with privacy regulators and governmental bodies.

Full Access
Question # 31

How does k-anonymity help to protect privacy in micro data sets?

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

D.

By top-coding all age data above a value of "k."

Full Access
Question # 32

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

A.

The Open ID Federation.

B.

PCI Data Security Standards Council

C.

International Organization for Standardization.

D.

Personal Information Protection and Electronic Documents Act.

Full Access
Question # 33

What is the most important requirement to fulfill when transferring data out of an organization?

A.

Ensuring the organization sending the data controls how the data is tagged by the receiver.

B.

Ensuring the organization receiving the data performs a privacy impact assessment.

C.

Ensuring the commitments made to the data owner are followed.

D.

Extending the data retention schedule as needed.

Full Access
Question # 34

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

A.

Advanced Encryption Standard (AES)

B.

Homomorphic encryption

C.

Quantum encryption

D.

Pseudonymization

Full Access
Question # 35

Which is NOT a suitable action to apply to data when the retention period ends?

A.

Aggregation.

B.

De-identification.

C.

Deletion.

D.

Retagging.

Full Access
Question # 36

To comply with the Sarbanes-Oxley Act (SOX), public companies in the United States are required to annually report on the effectiveness of the auditing controls of their financial reporting systems. These controls must be implemented to prevent unauthorized use, disclosure, modification, and damage or loss of financial data.

Why do these controls ensure both the privacy and security of data?

A.

Modification of data is an aspect of privacy; unauthorized use, disclosure, and damage or loss of data are aspects of security.

B.

Unauthorized use of data is an aspect of privacy; disclosure, modification, and damage or loss of data are aspects of security.

C.

Disclosure of data is an aspect of privacy; unauthorized use, modification, and damage or loss of data are aspects of security.

D.

Damage or loss of data are aspects of privacy; disclosure, unauthorized use, and modification of data are aspects of privacy.

Full Access
Question # 37

A key principle of an effective privacy policy is that it should be?

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Full Access
Question # 38

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?

A.

Develop a technical privacy framework that integrates with the development lifecycle.

B.

Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.

C.

Identify the privacy requirements as a part of the Privacy Impact Assessment (PIA) process during development and evaluation stages.

D.

Develop training programs that aid the developers in understanding how to turn privacy requirements into actionable code and design level specifications.

Full Access
Question # 39

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

A.

Individual participation.

B.

Purpose specification.

C.

Collection limitation.

D.

Accountability.

Full Access
Question # 40

Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India. The Aadhaar database contains the Aadhaar number, name, date of birth, gender and address of over 1 billion individuals.

Which of the following datasets derived from that data would be considered the most de-identified?

A.

A count of the years of birth and hash of the person’ s gender.

B.

A count of the month of birth and hash of the person's first name.

C.

A count of the day of birth and hash of the person’s first initial of their first name.

D.

Account of the century of birth and hash of the last 3 digits of the person's Aadhaar number.

Full Access
Question # 41

An organization based in California, USA is implementing a new online helpdesk solution for recording customer call information. The organization considers the capture of personal data on the online helpdesk solution to be in the interest of the company in best servicing customer calls.

Before implementation, a privacy technologist should conduct which of the following?

A.

A Data Protection Impact Assessment (DPIA) and consultation with the appropriate regulator to ensure legal compliance.

B.

A privacy risk and impact assessment to evaluate potential risks from the proposed processing operations.

C.

A Legitimate Interest Assessment (LIA) to ensure that the processing is proportionate and does not override the privacy, rights and freedoms of the customers.

D.

A security assessment of the help desk solution and provider to assess if the technology was developed with a security by design approach.

Full Access
Question # 42

Which of the following entities would most likely be exempt from complying with the General Data Protection Regulation (GDPR)?

A.

A South American company that regularly collects European customers’ personal data.

B.

A company that stores all customer data in Australia and is headquartered in a European Union (EU) member state.

C.

A Chinese company that has opened a satellite office in a European Union (EU) member state to service European customers.

D.

A North American company servicing customers in South Africa that uses a cloud storage system made by a European company.

Full Access
Question # 43

Which of the following is considered a records management best practice?

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Full Access
Question # 44

What is an Access Control List?

A.

A list of steps necessary for an individual to access a resource.

B.

A list that indicates the type of permission granted to each individual.

C.

A list showing the resources that an individual has permission to access.

D.

A list of individuals who have had their access privileges to a resource revoked.

Full Access
Question # 45

After stringent testing an organization has launched a new web-facing ordering system for its consumer medical products. As the medical products could provide indicators of health conditions, the organization could further strengthen its privacy controls by deploying?

A.

Run time behavior monitoring.

B.

A content delivery network.

C.

Context aware computing.

D.

Differential identifiability.

Full Access
Question # 46

Value sensitive design focuses on which of the following?

A.

Quality and benefit.

B.

Ethics and morality.

C.

Confidentiality and integrity.

D.

Consent and human rights.

Full Access
Question # 47

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

A.

Verifying the accuracy of the data by contacting users.

B.

Validating the company’s data collection procedures.

C.

Introducing erroneous data to see if its detected.

D.

Tracking changes to data through auditing.

Full Access
Question # 48

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

Which should be used to allow the home sales force to accept payments using smartphones?

A.

Field transfer protocol.

B.

Cross-current translation.

C.

Near-field communication

D.

Radio Frequency Identification

Full Access
Question # 49

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Full Access
Question # 50

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

What would be the best way to supervise the third-party systems the EnsureClaim App will share data with?

A.

Review the privacy notices for each third-party that the app will share personal data with to determine adequate privacy and data protection controls are in place.

B.

Conduct a security and privacy review before onboarding new vendors that collect personal data from the app.

C.

Anonymize all personal data collected by the app before sharing any data with third-parties.

D.

Develop policies and procedures that outline how data is shared with third-party apps.

Full Access
Question # 51

A clinical research organization is processing highly sensitive personal data, including numerical attributes, from medical trial results. The organization needs to manipulate the data without revealing the contents to data users. This can be achieved by utilizing?

A.

k-anonymity.

B.

Microdata sets.

C.

Polymorphic encryption.

D.

Homomorphic encryption.

Full Access
Question # 52

Which of the following is an example of drone “swarming”?

A.

A drone filming a cyclist from above as he rides.

B.

A drone flying over a building site to gather data.

C.

Drones delivering retailers’ packages to private homes.

D.

Drones communicating with each other to perform a search and rescue.

Full Access
Question # 53

Which of the following is NOT a factor to consider in FAIR analysis?

A.

The severity of the harm that might be caused by the privacy risk.

B.

The capability of a threat actor to exploit the analyzed privacy risk.

C.

The stage of the data life cycle in which the analyzed privacy risk occurs.

D.

The probability that a threat actor's attempts to exploit a privacy risk might succeed.

Full Access
Question # 54

An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?

A.

Transfer the data to another location.

B.

Invoke the appropriate deletion clause in the cloud terms and conditions.

C.

Obtain a destruction certificate from the cloud vendor.

D.

Destroy all encryption keys associated with the data.

Full Access
Question # 55

A privacy technologist has been asked to aid in a forensic investigation on the darknet following the compromise of a company's personal data. This will primarily involve an understanding of which of the following privacy-preserving techniques?

A.

Encryption

B.

Do Not Track

C.

Masking

D.

Tokenization

Full Access
Question # 56

An organization is concerned that its aging IT infrastructure will lead to Increased security and privacy risks. Which of the following would help mitigate these risks?

A.

Vulnerability management.

B.

Data Loss Prevention.

C.

Code audits.

D.

Network Centricity.

Full Access
Question # 57

Which of the following is the most important action to take prior to collecting personal data directly from a customer?

A.

Define what data needs to be collected.

B.

Define the purpose for collecting and using the data.

C.

Identify business requirements for the data that will be collected.

D.

Provide individuals with information about how their data will be used after collection.

Full Access
Question # 58

Which activity should the privacy technologist undertake to reduce potential privacy risk when evaluating options to process data in a country other than where it would be collected? ^

A.

Review the Data Life Cycle.

B.

Review data retention policies.

C.

Create enterprise data flow diagrams.

D.

Recommend controls for data transfers.

Full Access
Question # 59

An organization is using new technologies that will target and process personal data of EU customers. In which of the following circumstances would a privacy technologist need to support a data protection impact assessment (DPIA)?

A.

If a privacy notice and opt-m consent box are not displayed to the individual

B.

If security of data processing has not been evaluated

C.

If a large amount of personal data will be collected.

D.

If data processing is a high risk to an individual's rights and freedoms

Full Access
Question # 60

Which activity would best support the principle of data quality?

A.

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.

Ensuring that the number of teams processing personal information is limited.

C.

Delivering information in a format that the data subject understands.

D.

Ensuring that information remains accurate.

Full Access
Question # 61

How does browser fingerprinting compromise privacy?

A.

By creating a security vulnerability.

B.

By differentiating users based upon parameters.

C.

By persuading users to provide personal information.

D.

By customizing advertising based on the geographic location.

Full Access
Question # 62

Which of the following are the mandatory pieces of information to be included in the documentation of records of processing activities for an organization that processes personal data on behalf of another organization?

A.

Copies of the consent forms from each data subject.

B.

Time limits for erasure of different categories of data.

C.

Contact details of the processor and Data Protection Offer (DPO).

D.

Descriptions of the processing activities and relevant data subjects.

Full Access
Question # 63

What is the best way to protect privacy on a geographic information system (GIS)?

A.

Limiting the data provided to the system.

B.

Using a wireless encryption protocol.

C.

Scrambling location information.

D.

Using a firewall.

Full Access
Question # 64

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?

A.

The implied consent model provides the user with more detailed data collection information.

B.

To secure explicit consent, a user's website browsing would be significantly disrupted.

C.

An explicit consent model is more expensive to implement.

D.

Regulators prefer the implied consent model.

Full Access
Question # 65

In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?

A.

The size of the data.

B.

The format of the data.

C.

The range of the data.

D.

The medium of the data.

Full Access
Question # 66

What has been found to undermine the public key infrastructure system?

A.

Man-in-the-middle attacks.

B.

Inability to track abandoned keys.

C.

Disreputable certificate authorities.

D.

Browsers missing a copy of the certificate authority's public key.

Full Access