Pass the IAPP Information Privacy Technologist CIPT Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

When designing a new system, which of the following is a privacy threat that the privacy technologist should consider?

Options:

A.

Encryption.


B.

Social distancing.


C.

Social engineering.


D.

Identity and Access Management.


Expert Solution
Questions # 32:

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Ted's implementation is most likely a response to what incident?

Options:

A.

Encryption keys were previously unavailable to the organization's cloud storage host.


B.

Signatureless advanced malware was detected at multiple points on the organization's networks.


C.

Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network.


D.

Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor.


Expert Solution
Questions # 33:

What is the main benefit of using a private cloud?

Options:

A.

The ability to use a backup system for personal files.


B.

The ability to outsource data support to a third party.


C.

The ability to restrict data access to employees and contractors.


D.

The ability to cut costs for storing, maintaining, and accessing data.


Expert Solution
Questions # 34:

Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?

Options:

A.

Biometric data.


B.

Picture passwords.


C.

Personal identification number.


D.

Radio frequency identification.


Expert Solution
Questions # 35:

Machine-learning based solutions present a privacy risk because?

Options:

A.

Training data used during the training phase is compromised.


B.

The solution may contain inherent bias from the developers.


C.

The decision-making process used by the solution is not documented.


D.

Machine-learning solutions introduce more vulnerabilities than other software.


Expert Solution
Questions # 36:

What is the key idea behind the "flow" component of Nissenbaum's contextual integrity model?

Options:

A.

The flow of information from one actor to another.


B.

The integrity of information during each stage of the data lifecycle.


C.

The maintenance of accuracy when personal information is transmitted.


D.

The movement of personal information within a particular context or domain.


Expert Solution
Questions # 37:

Which of these actions is NOT generally part of the responsibility of an IT or software engineer?

Options:

A.

Providing feedback on privacy policies.


B.

Implementing multi-factor authentication.


C.

Certifying compliance with security and privacy law.


D.

Building privacy controls into the organization’s IT systems or software.


Expert Solution
Questions # 38:

SCENARIO

Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick and Harry are veteran senior information privacy and security professionals at their respective companies, and continue to lead the east and west divisions of New Company. The purpose of the meeting was to conduct a SWOT (strengths/weaknesses/opportunities/threats) analysis for New Company. Their SWOT analysis conclusions are summarized below.

Dick was enthusiastic about an opportunity for the New Company to reduce costs and increase computing power and flexibility through cloud services. East Company had been contemplating moving to the cloud, but West Company already had a vendor that was providing it with software-as-a-service (SaaS). Dick was looking forward to extending this service to the eastern region. Harry noted that this was a threat as well, because West Company had to rely on the third party to protect its data.

Tom mentioned that neither of the legacy companies had sufficient data storage space to meet the projected growth of New Company, which he saw as a weakness. Tom stated that one of the team's first projects would be to construct a consolidated New Company data warehouse. Tom would personally lead this project and would be held accountable if information was modified during transmission to or during storage in the new data warehouse.

Tom, Dick and Harry agreed that employee network access could be considered both a strength and a weakness. East Company and West Company had strong performance records in this regard; both had robust network access controls that were working as designed. However, during a projected year-long transition period, New Company employees would need to be able to connect to a New Company network while retaining access to the East Company and West Company networks.

When employees are working remotely, they usually connect to a Wi-Fi network. What should Harry advise for maintaining company security in this situation?

Options:

A.

Hiding wireless service set identifiers (SSID).


B.

Retaining the password assigned by the network.


C.

Employing Wired Equivalent Privacy (WEP) encryption.


D.

Using tokens sent through HTTP sites to verify user identity.


Expert Solution
Questions # 39:

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

What is the best way to minimize the risk of an exposure violation through the use of the app?

Options:

A.

Prevent the downloading of photos stored in the app.


B.

Dissociate the patient health data from the personal data.


C.

Exclude the collection of personal information from the health record.


D.

Create a policy to prevent combining data with external data sources.


Expert Solution
Questions # 40:

What is the distinguishing feature of asymmetric encryption?

Options:

A.

It has a stronger key for encryption than for decryption.


B.

It employs layered encryption using dissimilar methods.


C.

It uses distinct keys for encryption and decryption.


D.

It is designed to cross operating systems.


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions