Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

CIPT Certified Information Privacy Technologist (CIPT) Questions and Answers

Questions 4

Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?

Options:

A.

Biometric data.

B.

Picture passwords.

C.

Personal identification number.

D.

Radio frequency identification.

Buy Now
Questions 5

A user who owns a resource wants to give other individuals access to the resource. What control would apply?

Options:

A.

Mandatory access control.

B.

Role-based access controls.

C.

Discretionary access control.

D.

Context of authority controls.

Buy Now
Questions 6

Which of the following is one of the fundamental principles of information security?

Options:

A.

Accountability.

B.

Accessibility.

C.

Confidentiality.

D.

Connectivity.

Buy Now
Questions 7

Which of the following is NOT relevant to a user exercising their data portability rights?

Options:

A.

Notice and consent for the downloading of data.

B.

Detection of phishing attacks against the portability interface.

C.

Re-authentication of an account, including two-factor authentication as appropriate.

D.

Validation of users with unauthenticated identifiers (e.g. IP address, physical address).

Buy Now
Questions 8

What is the most important requirement to fulfill when transferring data out of an organization?

Options:

A.

Ensuring the organization sending the data controls how the data is tagged by the receiver.

B.

Ensuring the organization receiving the data performs a privacy impact assessment.

C.

Ensuring the commitments made to the data owner are followed.

D.

Extending the data retention schedule as needed.

Buy Now
Questions 9

Truncating the last octet of an IP address because it is NOT needed is an example of which privacy principle?

Options:

A.

Use Limitation

B.

Data Minimization

C.

Purpose Limitation

D.

Security Safeguards

Buy Now
Questions 10

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:

A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Buy Now
Questions 11

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

Options:

A.

The data and recipients for medical research are not specified

B.

Insufficient information is provided on notifications and infection alerts

C.

The sharing of information with an affiliated healthcare provider is too risky

D.

Allowing users to share risk result information for exposure and contact tracing purposes

Buy Now
Questions 12

When analyzing user data, how is differential privacy applied?

Options:

A.

By injecting noise into aggregated datasets.

B.

By assessing differences between datasets.

C.

By applying asymmetric encryption to datasets.

D.

By removing personal identifiers from datasets.

Buy Now
Questions 13

Which of the following is the best method to minimize tracking through the use of cookies?

Options:

A.

Use ‘private browsing’ mode and delete checked files, clear cookies and cache once a day.

B.

Install a commercially available third-party application on top of the browser that is already installed.

C.

Install and use a web browser that is advertised as ‘built specifically to safeguard user privacy’.

D.

Manage settings in the browser to limit the use of cookies and remove them once the session completes.

Buy Now
Questions 14

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

Options:

A.

Verifying the accuracy of the data by contacting users.

B.

Validating the company’s data collection procedures.

C.

Introducing erroneous data to see if its detected.

D.

Tracking changes to data through auditing.

Buy Now
Questions 15

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

  • There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.
  • You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.
  • There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.
  • Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.
  • All the WebTracker and SmartHome customers are based in USA and Canada.

Which of the following issues is most likely to require an investigation by the Chief Privacy Officer (CPO) of WebTracker?

Options:

A.

Data flows use encryption for data at rest, as defined by the IT manager.

B.

AmaZure sends newsletter to WebTracker customers, as approved by the Marketing Manager.

C.

Employees’ personal data are being stored in a cloud HR system, as approved by the HR Manager.

D.

File Integrity Monitoring is being deployed in SQL servers, as indicated by the IT Architect Manager.

Buy Now
Questions 16

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

What measures can protect client information stored at GFDC?

Options:

A.

De-linking of data into client-specific packets.

B.

Cloud-based applications.

C.

Server-side controls.

D.

Data pruning

Buy Now
Questions 17

An organization is concerned that its aging IT infrastructure will lead to Increased security and privacy risks. Which of the following would help mitigate these risks?

Options:

A.

Vulnerability management.

B.

Data Loss Prevention.

C.

Code audits.

D.

Network Centricity.

Buy Now
Questions 18

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

An individual with an RFID receiver can track people or consumer products.

B.

An individual can scramble computer transmissions in weapons systems.

C.

An individual can use an RFID receiver to engage in video surveillance.

D.

An individual can tap mobile phone communications.

Buy Now
Questions 19

Which is NOT a way to validate a person's identity?

Options:

A.

Swiping a smartcard into an electronic reader.

B.

Using a program that creates random passwords.

C.

Answering a question about "something you know”.

D.

Selecting a picture and tracing a unique pattern on it

Buy Now
Questions 20

What is the potential advantage of homomorphic encryption?

Options:

A.

Encrypted information can be analyzed without decrypting it first.

B.

Ciphertext size decreases as the security level increases.

C.

It allows greater security and faster processing times.

D.

It makes data impenetrable to attacks.

Buy Now
Questions 21

Which of the following is an example of drone “swarming”?

Options:

A.

A drone filming a cyclist from above as he rides.

B.

A drone flying over a building site to gather data.

C.

Drones delivering retailers’ packages to private homes.

D.

Drones communicating with each other to perform a search and rescue.

Buy Now
Questions 22

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

  • Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.
  • The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.
  • DES is the strongest encryption algorithm currently used for any file.
  • Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.
  • Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which is true regarding the type of encryption Lancelot uses?

Options:

A.

It employs the data scrambling technique known as obfuscation.

B.

Its decryption key is derived from its encryption key.

C.

It uses a single key for encryption and decryption.

D.

It is a data masking methodology.

Buy Now
Questions 23

What is the main benefit of using a private cloud?

Options:

A.

The ability to use a backup system for personal files.

B.

The ability to outsource data support to a third party.

C.

The ability to restrict data access to employees and contractors.

D.

The ability to cut costs for storing, maintaining, and accessing data.

Buy Now
Questions 24

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

Options:

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Buy Now
Questions 25

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

Options:

A.

Relationship of family member

B.

Phone number

C.

Dale of birth

D.

Citizenship

Buy Now
Questions 26

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

  • There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.
  • You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.
  • There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.
  • Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.
  • All the WebTracker and SmartHome customers are based in USA and Canada.

Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?

Options:

A.

Verify that WebTracker's HR and Payroll systems implement the current privacy notice (after the typos are fixed).

B.

Review the list of subcontractors employed by AmaZure and ensure these are included in the formal agreement with WebTracker.

C.

Evaluate and review the basis for processing employees’ personal data in the context of the prototype created by WebTracker and approved by the CEO.

D.

Confirm whether the data transfer from London to the USA has been fully approved by AmaZure and the appropriate institutions in the USA and the European Union.

Buy Now
Questions 27

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

Options:

A.

Server driven controls.

B.

Cloud computing

C.

Data on demand

D.

MAC filtering

Buy Now
Questions 28

What has been found to undermine the public key infrastructure system?

Options:

A.

Man-in-the-middle attacks.

B.

Inability to track abandoned keys.

C.

Disreputable certificate authorities.

D.

Browsers missing a copy of the certificate authority's public key.

Buy Now
Questions 29

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe?

Options:

A.

The Personal Data Ordinance.

B.

The EU Data Protection Directive.

C.

The Code of Fair Information Practices.

D.

The Organization for Economic Co-operation and Development (OECD) Privacy Principles.

Buy Now
Questions 30

What tactic does pharming use to achieve its goal?

Options:

A.

It modifies the user's Hosts file.

B.

It encrypts files on a user's computer.

C.

It creates a false display advertisement.

D.

It generates a malicious instant message.

Buy Now
Questions 31

What must be used in conjunction with disk encryption?

Options:

A.

Increased CPU speed.

B.

A strong password.

C.

A digital signature.

D.

Export controls.

Buy Now
Questions 32

Which of the following is NOT a step in the methodology of a privacy risk framework?

Options:

A.

Assessment.

B.

Monitoring.

C.

Response.

D.

Ranking.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist (CIPT)
Last Update: May 1, 2024
Questions: 214

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now CIPT testing engine

PDF (Q&A)

$35  $99.99
buy now CIPT pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 May 2024