Pass the IAPP Information Privacy Technologist CIPT Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

What type of principles would be the best guide for Jane's ideas regarding a new data management program?

Options:

A.

Collection limitation principles.


B.

Vendor management principles.


C.

Incident preparedness principles.


D.

Fair Information Practice Principles


Expert Solution
Questions # 2:

A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?

Options:

A.

Geofencing


B.

Geo-tracking


C.

Geo-tagging


D.

Geolocation


Expert Solution
Questions # 3:

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

Options:

A.

Phishing emails.


B.

Denial of service.


C.

Brute-force attacks.


D.

Social engineering.


Expert Solution
Questions # 4:

A company seeking to hire engineers in Silicon Valley ran an ad campaign targeting women in a specific age range who live in the San Francisco Bay Area.

Which Calo objective privacy harm is likely to result from this campaign?

Options:

A.

Lost opportunity.


B.

Economic loss.


C.

Loss of liberty.


D.

Social detriment.


Expert Solution
Questions # 5:

What is the main issue pertaining to data protection with the use of 'deep fakes'?

Options:

A.

Misinformation.


B.

Non-conformity with the accuracy principle.


C.

Issues with establishing non-repudiation.


D.

Issues with confidentiality of the information.


Expert Solution
Questions # 6:

What is the main benefit of using dummy data during software testing?

Options:

A.

The data comes in a format convenient for testing.


B.

Statistical disclosure controls are applied to the data.


C.

The data enables the suppression of particular values in a set.


D.

Developers do not need special privacy training to test the software.


Expert Solution
Questions # 7:

Which of the following statements is true regarding software notifications and agreements?

Options:

A.

Website visitors must view the site’s privacy statement before downloading software.


B.

Software agreements are designed to be brief, while notifications provide more details.


C.

It is a good practice to provide users with information about privacy prior to software installation.


D.

“Just in time” software agreement notifications provide users with a final opportunity to modify the agreement.


Expert Solution
Questions # 8:

An organization is considering launching enhancements to improve security and authentication mechanisms in their products. To better identify the user and reduce friction from the authentication process, they plan to track physical attributes of an individual. A privacy technologist assessing privacy implications would be most interested in which of the following?

Options:

A.

The purpose of the data tracking.


B.

That the individual is aware tracking is occurring.


C.

The authentication mechanism proposed.


D.

The encryption of individual physical attributes.


Expert Solution
Questions # 9:

A credit card with the last few numbers visible is an example of what?

Options:

A.

Masking data


B.

Synthetic data


C.

Sighting controls.


D.

Partial encryption


Expert Solution
Questions # 10:

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Which of the following issues is most likely to require an investigation by the Chief Privacy Officer (CPO) of WebTracker?

Options:

A.

Data flows use encryption for data at rest, as defined by the IT manager.


B.

AmaZure sends newsletter to WebTracker customers, as approved by the Marketing Manager.


C.

Employees’ personal data are being stored in a cloud HR system, as approved by the HR Manager.


D.

File Integrity Monitoring is being deployed in SQL servers, as indicated by the IT Architect Manager.


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions