Pass the IAPP Information Privacy Technologist CIPT Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is typically NOT performed by sophisticated Access Management (AM) techniques?

Options:

A.

Restricting access to data based on location.


B.

Restricting access to data based on user role.


C.

Preventing certain types of devices from accessing data.


D.

Preventing data from being placed in unprotected storage.


Expert Solution
Questions # 12:

What is the most important requirement to fulfill when transferring data out of an organization?

Options:

A.

Ensuring the organization sending the data controls how the data is tagged by the receiver.


B.

Ensuring the organization receiving the data performs a privacy impact assessment.


C.

Ensuring the commitments made to the data owner are followed.


D.

Extending the data retention schedule as needed.


Expert Solution
Questions # 13:

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Question # 13

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

Which question would you most likely ask to gain more insight about LeadOps and provide practical privacy recommendations?

Options:

A.

What is LeadOps’ annual turnover?


B.

How big is LeadOps’ employee base?


C.

Where are LeadOps' operations and hosting services located?


D.

Does LeadOps practice agile development and maintenance of their system?


Expert Solution
Questions # 14:

Which of the following would be an example of an "objective" privacy harm to an individual, based on Calo's Harm Dimensions?

Options:

A.

Receiving spam following the sale of an email address.


B.

Negative feelings derived from government surveillance.


C.

Social media profile views indicating unexpected interest in a person.


D.

Personal data inaccuracies present in a user's social media profile.


Expert Solution
Questions # 15:

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

Options:

A.

Server driven controls.


B.

Cloud computing


C.

Data on demand


D.

MAC filtering


Expert Solution
Questions # 16:

Which of the following techniques describes the use of encryption where encryption keys are divided into parts that can then be used to recover a full encryption key?

Options:

A.

Homomorphic encryption.


B.

Asymmetric cryptography.


C.

Cryptographic hashing.


D.

Secret sharing.


Expert Solution
Questions # 17:

Which of the following suggests the greatest degree of transparency?

Options:

A.

A privacy disclosure statement clearly articulates general purposes for collection


B.

The data subject has multiple opportunities to opt-out after collection has occurred.


C.

A privacy notice accommodates broadly defined future collections for new products.


D.

After reading the privacy notice, a data subject confidently infers how her information will be used.


Expert Solution
Questions # 18:

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

Which regulator has jurisdiction over the shop's data management practices?

Options:

A.

The Federal Trade Commission.


B.

The Department of Commerce.


C.

The Data Protection Authority.


D.

The Federal Communications Commission.


Expert Solution
Questions # 19:

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

An individual with an RFID receiver can track people or consumer products.


B.

An individual can scramble computer transmissions in weapons systems.


C.

An individual can use an RFID receiver to engage in video surveillance.


D.

An individual can tap mobile phone communications.


Expert Solution
Questions # 20:

What term describes two re-identifiable data sets that both come from the same unidentified individual?

Options:

A.

Pseudonymous data.


B.

Anonymous data.


C.

Aggregated data.


D.

Imprecise data.


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions