Certbus > IAPP > IAPP Certifications > CIPT > CIPT Online Practice Questions and Answers

CIPT Online Practice Questions and Answers

Questions 4

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

1.

"I consent to receive notifications and infection alerts";

2.

"I consent to receive information on additional features or services, and new products";

3.

"I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

4.

"I consent to share my data for medical research purposes"; and

5.

"I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening service works as follows:

1.

Step 1 A photo of the user's face is taken.

2.

Step 2 The user measures their temperature and adds the reading in the app

3.

Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

4.

Step 4 The user is asked to answer questions on known symptoms

5.

Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium' or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

A. The data and recipients for medical research are not specified

B. Insufficient information is provided on notifications and infection alerts

C. The sharing of information with an affiliated healthcare provider is too risky

D. Allowing users to share risk result information for exposure and contact tracing purposes

Browse 274 Q&As
Questions 5

What would be an example of an organization transferring the risks associated with a data breach?

A. Using a third-party service to process credit card transactions.

B. Encrypting sensitive personal data during collection and storage

C. Purchasing insurance to cover the organization in case of a breach.

D. Applying industry standard data handling practices to the organization' practices.

Browse 274 Q&As
Questions 6

Between November 30th and December 2nd, 2013, cybercriminals successfully infected the credit card payment systems and bypassed security controls of a United States-based retailer with malware that exfiltrated 40 million credit card numbers. Six months prior, the retailer had malware detection software installed to prevent against such an attack.

Which of the following would best explain why the retailer's consumer data was still exfiltrated?

A. The detection software alerted the retailer's security operations center per protocol, but the information security personnel failed to act upon the alerts.

B. The U.S Department of Justice informed the retailer of the security breach on Dec. 12th, but the retailer took three days to confirm the breach and eradicate the malware.

C. The IT systems and security measures utilized by the retailer's third-party vendors were in compliance with industry standards, but their credentials were stolen by black hat hackers who then entered the retailer's system.

D. The retailer's network that transferred personal data and customer payments was separate from the rest of the corporate network, but the malware code was disguised with the name of software that is supposed to protect this information.

Browse 274 Q&As
Questions 7

A valid argument against data minimization is that it?

A. Can limit business opportunities.

B. Decreases the speed of data transfers.

C. Can have an adverse effect on data quality.

D. Increases the chance that someone can be identified from data.

Browse 274 Q&As
Questions 8

Which of the following best describes the basic concept of "Privacy by Design?"

A. The adoption of privacy enhancing technologies.

B. The integration of a privacy program with all lines of business.

C. The implementation of privacy protection through system architecture.

D. The introduction of business process to identify and assess privacy gaps.

Browse 274 Q&As
Questions 9

Which of the following most embodies the principle of Data Protection by Default?

A. A messaging app for high school students that uses HTTPS to communicate with the server.

B. An electronic teddy bear with built-in voice recognition that only responds to its owner's voice.

C. An internet forum for victims of domestic violence that allows anonymous posts without registration.

D. A website that has an opt-in form for marketing emails when registering to download a whitepaper.

Browse 274 Q&As
Questions 10

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

A. Verifying the accuracy of the data by contacting users.

B. Validating the company's data collection procedures.

C. Introducing erroneous data to see if its detected.

D. Tracking changes to data through auditing.

Browse 274 Q&As
Questions 11

Which of the following is a privacy consideration for NOT sending large-scale SPAM type emails to a database of email addresses?

A. Poor user experience.

B. Emails are unsolicited.

C. Data breach notification.

D. Reduction in email deliverability score.

Browse 274 Q&As
Questions 12

SCENARIO Please use the following to answer next question: EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim

uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters. The app collects the following information:

1.

First and last name

2.

Date of birth (DOB)

3.

Mailing address

4.

Email address

5.

Car VIN number

6.

Car model

7.

License plate

8.

Insurance card number

9.

Photo 10.Vehicle diagnostics 11.Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

A. Encryption.

B. Access Controls.

C. De-identification.

D. Multi-factor authentication.

Browse 274 Q&As
Questions 13

Which of the following methods does NOT contribute to keeping the data confidential?

A. Differential privacy.

B. Homomorphic encryption.

C. K-anonymity.

D. Referential integrity.

Browse 274 Q&As
Questions 14

An organization needs to be able to manipulate highly sensitive personal information without revealing the contents of the data to the users. The organization should investigate the use of?

A. Advanced Encryption Standard (AES)

B. Homomorphic encryption

C. Quantum encryption

D. Pseudonymization

Browse 274 Q&As
Questions 15

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business

doubled. Carol told Sam, "I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to

get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. "Carol, I know that he doesn't realize it, but some of Sam's efforts to increase sales have put you in a vulnerable position. You are

not protecting customers' personal information like you should."

Sam said, "I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers' names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece

that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me

their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase."

Carol replied, "Jane, that doesn't sound so bad. Could you just fix things and help us to post even more online?"

`I can," said Jane. "But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their

personal information. We also should develop a social media strategy."

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. "Sam and Jane, you have done

such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

When initially collecting personal information from customers, what should Jane be guided by?

A. Onward transfer rules.

B. Digital rights management.

C. Data minimization principles.

D. Vendor management principles

Browse 274 Q&As
Questions 16

Which of the following is an example of an appropriation harm?

A. A friend takes and uploads your pictures to a social media website.

B. A hacker gains access to your email account and reads your messages.

C. A government agency uses cameras to monitor your movements in a public area.

D. An unauthorized individual obtains access to your personal information and uses it for medical fraud.

Browse 274 Q&As
Questions 17

An organization's customers have suffered a number of data breaches through successful social engineering attacks. Which is the most effective preventative technical control to reduce the risk of future occurrences?

A. Audit and logging.

B. Training and awareness.

C. Data loss prevention (DLP).

D. Multi-factor authentication.

Browse 274 Q&As
Questions 18

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only

necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This

is accessible through the `Settings' icon from any app page then clicking `My Preferences', and selecting `Information Sharing and Consent' where the following choices are displayed:

1.

"I consent to receive notifications and infection alerts";

2.

"I consent to receive information on additional features or services and new products";

3.

"I consent to sharing only my risk result and location information for exposure and contact tracing purposes";

4.

"I consent to share my data for medical research purposes"; and

5.

"I consent to share my data with healthcare providers affiliated to the company".

For each choice, an `ON' or `OFF' tab is available The default setting is `ON' for all. Users purchase a virus screening service for US$29.99 for themselves or others using the app. The virus screening service works as follows:

1.

Step 1: A photo of the user's face is taken

2.

Step 2: The user measures their temperature and adds the reading in the app

3.

Step 3: The user is asked to read sentences so that a voice analysis can detect symptoms

4.

Step 4: The user is asked to answer questions on known symptoms

5.

Step 5: The user can input information on family members (name, date of birth, citizenship, home address, phone number, email and relationship).

The results are displayed as one of the following risk status "Low", "Medium" or "High". If the user is deemed at "Medium" or "High" risk an alert may be sent to other users, and the user is invited to seek a medical consultation and diagnostic from a healthcare provider.

A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in close proximity of an infected person. If a user has come in contact with another individual classified as `medium' or `high' risk, an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual. Location is collected using the phone's GPS functionality, whether the app is in use or not however the exact location of the user is "blurred' for privacy reasons. Users can only see on the map circles with a 12-feet radius (approximately 4 meters wide), which is double the recommended distance for social distancing.

With regard to the location-tracking feature of the app, which of the following is the privacy technologist's greatest area of concern?

A. Unfair pricing based on location.

B. Accuracy and use of location data.

C. Tailoring advertisements to the user's location

D. Use of cookies and other web-tracking technologies

Browse 274 Q&As
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist (CIPT)
Last Update: Mar 14, 2025
Questions: 274 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99