Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions
Questions # 11:

Last year Ecosoft 8150 was hacked and a number of servers and programs were affected. Since the incident, the company started collecting metrics on data privacy and system outages to try to stop it from happening in the future.

What analysis would be most helpful based on the data they have collected?

Options:

A.

Return on Investment (ROI).


B.

Compliance analysis.


C.

Business Resiliency.


D.

Trend analysis.


Expert Solution
Questions # 12:

Which of the following indicates you have developed the right privacy framework for your organization?

Options:

A.

It includes a privacy assessment of each major system.


B.

It improves the consistency of the privacy program.


C.

It works at a different type of organization.


D.

It identifies all key stakeholders by name.


Expert Solution
Questions # 13:

What does it mean to “rationalize” data protection requirements?

Options:

A.

Evaluate the costs and risks of applicable laws and regulations and address those that have the greatest penalties


B.

Look for overlaps in laws and regulations from which a common solution can be developed


C.

Determine where laws and regulations are redundant in order to eliminate some from requiring compliance


D.

Address the less stringent laws and regulations, and inform stakeholders why they are applicable


Expert Solution
Questions # 14:

During a merger and acquisition, the most comprehensive review of privacy risks and gaps occurs when conducting what activity?

Options:

A.

Transfer Impact Assessment (TIA).


B.

Risk identification review.


C.

Due diligence.


D.

Integration.


Expert Solution
Questions # 15:

What is the main function of the Asia-Pacific Economic Cooperation (APEC) Privacy Framework?

Options:

A.

Managing the data flows from parties outside the region.


B.

Establishing legal requirements for privacy protection in the region.


C.

Promoting privacy protection technologies developed in the region.


D.

Promoting consumer trust and business confidence in cross-border data flows.


Expert Solution
Questions # 16:

The theft of proprietary information could have best been prevented by?

Options:

A.

Doing criminal background checks on all contractors.


B.

Having requests for access reviewed by the privacy office.


C.

Escalating access requests for approval by the appropriate data custodian.


D.

Requiring multi-factor authentication for contractor access to confidential company data.


Expert Solution
Questions # 17:

What is the main purpose in notifying data subjects of a data breach?

Options:

A.

To avoid financial penalties and legal liability.


B.

To enable regulators to understand trends and developments that may shape the law.


C.

To ensure organizations have accountability for the sufficiency of their security measures.


D.

To allow individuals to take any actions required to protect themselves from possible consequences.


Expert Solution
Questions # 18:

In privacy protection, what is a "covered entity"?

Options:

A.

Personal data collected by a privacy organization.


B.

An organization subject to the privacy provisions of HIPAA.


C.

A privacy office or team fully responsible for protecting personal information.


D.

Hidden gaps in privacy protection that may go unnoticed without expert analysis.


Expert Solution
Questions # 19:

The purpose of a data flow map is to help an organization do all of the following EXCEPT?

Options:

A.

Determine unidentified opportunities for information collection.


B.

Assist compliance with privacy-related laws and regulations.


C.

Identify any.


D.

Recognize who in the organization has access to what information.


Expert Solution
Questions # 20:

SCENARIO

Please use the following to answer the next QUESTION:

Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.

This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. "It's going to be great," the developer, Deidre Hoffman, tells you, "if, that is, we actually get it working!" She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. "It's just three young people," she says, "but they do great work." She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. "They do good work, so I chose them."

Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, "I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!"

Which is the best first step in understanding the data security practices of a potential vendor?

Options:

A.

Requiring the vendor to complete a questionnaire assessing International Organization for Standardization (ISO) 27001 compliance.


B.

Conducting a physical audit of the vendor's facilities.


C.

Conducting a penetration test of the vendor's data security structure.


D.

Examining investigation records of any breaches the vendor has experienced.


Expert Solution
Viewing page 2 out of 9 pages
Viewing questions 11-20 out of questions