Pass the IAPP Information Privacy Technologist CIPT Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

Options:

A.

The Open ID Federation.


B.

PCI Data Security Standards Council


C.

International Organization for Standardization.


D.

Personal Information Protection and Electronic Documents Act.


Expert Solution
Questions # 22:

After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation:

Statement 1 reads: “Please check this box to confirm you have read and accept the terms and conditions of the end user license agreement” and includes a hyperlink to the terms and conditions.

Statement 2 reads: “Please check this box to confirm you have read and understood the privacy notice” and includes a hyperlink to the privacy notice.

Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?

Options:

A.

Consent.


B.

Vital interests.


C.

Legal obligation.


D.

Legitimate interests.


Expert Solution
Questions # 23:

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?

Options:

A.

Limited-retention, de-identified logs including only metadata.


B.

Limited-retention, de-identified logs including the links clicked in messages as well as metadata.


C.

Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.


D.

Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.


Expert Solution
Questions # 24:

Which of the following is NOT a step in the methodology of a privacy risk framework?

Options:

A.

Assessment.


B.

Monitoring.


C.

Response.


D.

Ranking.


Expert Solution
Questions # 25:

An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?

Options:

A.

Transfer the data to another location.


B.

Invoke the appropriate deletion clause in the cloud terms and conditions.


C.

Obtain a destruction certificate from the cloud vendor.


D.

Destroy all encryption keys associated with the data.


Expert Solution
Questions # 26:

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

Options:

A.

Implementing a mandatory privacy review and legal approval process.


B.

Obtain leadership buy-in for a mandatory privacy review and approval process.


C.

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.


D.

Conduct annual Privacy by Design training and refreshers for all impacted personnel.


Expert Solution
Questions # 27:

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?

Options:

A.

Symmetric Encryption


B.

Tokenization


C.

Obfuscation


D.

Certificates


Expert Solution
Questions # 28:

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

Options:

A.

Encryption.


B.

Access Controls.


C.

De-identification.


D.

Multi-factor authentication.


Expert Solution
Questions # 29:

A valid argument against data minimization is that it?

Options:

A.

Can limit business opportunities.


B.

Decreases the speed of data transfers.


C.

Can have an adverse effect on data quality.


D.

Increases the chance that someone can be identified from data.


Expert Solution
Questions # 30:

Why is first-party web tracking very difficult to prevent?

Options:

A.

The available tools to block tracking would break most sites’ functionality.


B.

Consumers enjoy the many benefits they receive from targeted advertising.


C.

Regulatory frameworks are not concerned with web tracking.


D.

Most browsers do not support automatic blocking.


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions