Pass the IAPP Certified Information Privacy Manager CIPM Questions and answers with CertsForce

Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions
Questions # 51:

What have experts identified as an important trend in privacy program development?

Options:

A.

The narrowing of regulatory definitions of personal information.


B.

The rollback of ambitious programs due to budgetary restraints.


C.

The movement beyond crisis management to proactive prevention.


D.

The stabilization of programs as the pace of new legal mandates slows.


Expert Solution
Questions # 52:

“Respond” in the privacy operational lifecycle includes which of the following?

Options:

A.

Information security practices and functional area integration.


B.

Privacy awareness training and compliance monitoring.


C.

Communication to stakeholders and alignment to laws.


D.

Information requests and privacy rights requests.


Expert Solution
Questions # 53:

What are you doing if you succumb to "overgeneralization" when analyzing data from metrics?

Options:

A.

Using data that is too broad to capture specific meanings.


B.

Possessing too many types of data to perform a valid analysis.


C.

Using limited data in an attempt to support broad conclusions.


D.

Trying to use several measurements to gauge one aspect of a program.


Expert Solution
Questions # 54:

In a mobile app for purchasing and selling concert tickets, users are prompted to create a personalized profile prior to engaging in transactions. Once registered, users can securely access their profiles within the app, empowering them to manage and modify personal data as needed.

Which foundational Privacy by Design (PbD) principle does this feature follow?

Options:

A.

Proactive, not reactive; preventative, not remedial.


B.

Full functionality — positive-sum, not zero-sum.


C.

Respect for user privacy - keep it user-centric.


D.

End-to-end security — full life cycle protection.


Expert Solution
Questions # 55:

All of the following are access control measures required by the Payment Card Industry Data Security Standard (PCI DSS) EXCEPT?

Options:

A.

Restrict physical access to cardholder data.


B.

Update antivirus software before granting access.


C.

Assign a unique ID to each person with computer access.


D.

Restrict access to cardholder data by business need-to-know.


Expert Solution
Questions # 56:

Under the European Data Protection Board (EDPB). which processing operation would require a DPIA?

Options:

A.

An online newspaper using its subscriber list to email a daily newsletter.


B.

A healthcare clinic that processes personal data of its patients in its billing system.


C.

A hospital processing patient's genetic and health data in its hospital information system.


D.

An online store displaying advertisements based on items viewed or purchased on its own website.


Expert Solution
Questions # 57:

SCENARIO

Please use the following to answer the next question:

Liam is the newly appointed information technology (IT) compliance manager at Mesa, a USbased outdoor clothing brand with a global E-commerce presence. During his second week, he is contacted by the company’s IT audit manager, who informs him that the auditing team will be conducting a review of Mesa’s privacy compliance risk in a month.

A bit nervous about the audit, Liam asks his boss what his predecessor had completed related to privacy compliance before leaving the company. Liam is told that a consent management tool had been added to the website and they commissioned a privacy risk evaluation from a small consulting firm last year that determined that their risk exposure was relatively low given their current control environment. After reading the consultant’s report, Liam realized that the scope of the assessment was limited to breach notification laws in the US and the Payment Card Industry’s Data Security Standard (PCI DSS).

Not wanting to let down his new team, Liam kept his concerns about the report to himself and figured he could try to put some additional controls into place before the audit. Having some privacy compliance experience in his last role, Liam thought he might start by having discussions with the E-commerce and marketing teams.

The E-commerce Director informed him that they were still using the cookie consent tool forcibly placed on the home screen by the CIO, but could not understand the point since their office was not located in California or Europe. The marketing director touted his department’s success with purchasing email lists and taking a shotgun approach to direct marketing. Both directors highlighted their tracking tools on the website to enhance customer experience while learning more about where else the customer had shopped. The more people Liam met with, the more it became apparent that privacy awareness and the general control environment at Mesa needed help.

With three weeks before the audit, Liam updated Mesa's Privacy Notice himself, which was taken and revised from a competitor’s website. He also wrote policies and procedures outlining the roles and responsibilities for privacy within Mesa and distributed the document to all departments he knew of with access to personal information.

During this time. Liam also filled the backlog of data subject requests for deletion that had been sent to him by the customer service manager. Liam worked with application owners to remove these individual's information and order history from the customer relationship management (CRM) tool, the enterprise resource planning (ERP). the data warehouse and the email server.

At the audit kick-off meeting. Liam explained to his boss and her team that there may still be some room for improvement, but he thought the risk had been mitigated to an appropriate level based on the work he had done thus far.

After the audit had been completed, the audit manager and Liam met to discuss her team’s findings, and much to his dismay. Liam was told that none of the work he had completed prior to the audit followed best practices for governance and risk mitigation. In fact, his actions only opened the company up to additional risk and scrutiny. Based on these findings. Liam worked with external counsel and an established privacy consultant to develop a remediation plan.

All of the key phases of an audit have occurred with Liam's involvement in the situation EXCEPT?

Options:

A.

Prepare.


B.

Audit.


C.

Report.


D.

Follow-up.


Expert Solution
Questions # 58:

A systems audit uncovered a shared drive folder containing sensitive employee data with no access controls and therefore was available for all employees to view. What is the first step to mitigate further risks?

Options:

A.

Notify all employees whose information was contained in the file.


B.

Check access logs to see who accessed the folder.


C.

Notify legal counsel of a privacy incident.


D.

Restrict access to the folder.


Expert Solution
Questions # 59:

Which is TRUE about the scope and authority of data protection oversight authorities?

Options:

A.

The Office of the Privacy Commissioner (OPC) of Canada has the right to impose financial sanctions on

violators.


B.

All authority in the European Union rests with the Data Protection Commission (DPC).


C.

No one agency officially oversees the enforcement of privacy regulations in the United States.


D.

The Asia-Pacific Economic Cooperation (APEC) Privacy Frameworks require all member nations to designate a national data protection authority.


Expert Solution
Questions # 60:

PbD is the framework that?

Options:

A.

Dictates the design of the system development life cycle.


B.

Establishes risk-based expectations for privacy management.


C.

Embeds privacy into the design of technology, systems and practices.


D.

Guides organizations in designing, implementing and managing privacy programs in line with privacy laws and best practices.


Expert Solution
Viewing page 6 out of 8 pages
Viewing questions 51-60 out of questions