Pass the IAPP Information Privacy Technologist CIPT Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following statements describes an acceptable disclosure practice?

Options:

A.

An organization’s privacy policy discloses how data will be used among groups within the organization itself.


B.

With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.


C.

Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.


D.

When an organization discloses data to a vendor, the terms of the vendor’ privacy notice prevail over the organization’ privacy notice.


Expert Solution
Questions # 52:

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?

Options:

A.

Develop a technical privacy framework that integrates with the development lifecycle.


B.

Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.


C.

Identify the privacy requirements as a part of the Privacy Impact Assessment (PIA) process during development and evaluation stages.


D.

Develop training programs that aid the developers in understanding how to turn privacy requirements into actionable code and design level specifications.


Expert Solution
Questions # 53:

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which regulation most likely applies to the data stored by Berry Country Regional Medical Center?

Options:

A.

Personal Information Protection and Electronic Documents Act


B.

Health Insurance Portability and Accountability Act


C.

The Health Records Act 2001


D.

The European Union Directive 95/46/EC


Expert Solution
Questions # 54:

What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?

Options:

A.

The ad being served to the user may not be relevant.


B.

The user’s sensitive personal information is used to display targeted ads.


C.

The personal information used to target ads can be discerned by the server.


D.

The user’s information can be leaked to an advertiser through weak de-identification techniques.


Expert Solution
Questions # 55:

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?

Options:

A.

Configuring the environment to use shorter error messages.


B.

Handing exceptions internally and not displaying errors to the user.


C.

Creating default error pages or error messages which do not include variable data.


D.

Logging the session name and necessary parameters once the error occurs to enable trouble shooting.


Expert Solution
Questions # 56:

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

Options:

A.

Individual participation.


B.

Purpose specification.


C.

Collection limitation.


D.

Accountability.


Expert Solution
Questions # 57:

Which of the following is NOT relevant to a user exercising their data portability rights?

Options:

A.

Notice and consent for the downloading of data.


B.

Detection of phishing attacks against the portability interface.


C.

Re-authentication of an account, including two-factor authentication as appropriate.


D.

Validation of users with unauthenticated identifiers (e.g. IP address, physical address).


Expert Solution
Questions # 58:

Which of these is considered an ethical dark pattern on privacy?

Options:

A.

Using attractive designs to influence an individual.


B.

Rewarding users for providing more personal information


C.

Giving users more privacy options in relation to their personal information


D.

Providing dear and simple privacy notices to users


Expert Solution
Questions # 59:

Granting data subjects the right to have data corrected, amended, or deleted describes?

Options:

A.

Use limitation.


B.

Accountability.


C.

A security safeguard


D.

Individual participation


Expert Solution
Questions # 60:

What risk is mitigated when routing video traffic through a company’s application servers, rather than sending the video traffic directly from one user to another?

Options:

A.

The user is protected against phishing attacks.


B.

The user’s identity is protected from the other user.


C.

The user’s approximate physical location is hidden from the other user.


D.

The user is assured that stronger authentication methods have been used.


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions