Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified Information Privacy Technologist Question and Answers

Certified Information Privacy Technologist

Last Update Sep 23, 2025
Total Questions : 220

We are offering FREE CIPT IAPP exam questions. All you do is to just go and sign up. Give your details, prepare CIPT free exam questions and then go for complete pool of Certified Information Privacy Technologist test questions that will help you more.

CIPT pdf

CIPT PDF

$42  $104.99
CIPT Engine

CIPT Testing Engine

$50  $124.99
CIPT PDF + Engine

CIPT PDF + Testing Engine

$66  $164.99
Questions 1

After downloading and loading a mobile app, the user is presented with an account registration page requesting the user to provide certain personal details. Two statements are also displayed on the same page along with a box for the user to check to indicate their confirmation:

Statement 1 reads: “Please check this box to confirm you have read and accept the terms and conditions of the end user license agreement” and includes a hyperlink to the terms and conditions.

Statement 2 reads: “Please check this box to confirm you have read and understood the privacy notice” and includes a hyperlink to the privacy notice.

Under the General Data Protection Regulation (GDPR), what lawful basis would you primarily except the privacy notice to refer to?

Options:

A.  

Consent.

B.  

Vital interests.

C.  

Legal obligation.

D.  

Legitimate interests.

Discussion 0
Questions 2

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What should Finley Motors have done to incorporate the transparency principle of Privacy by Design (PbD)?

Options:

A.  

Signed a data sharing agreement with AMP Payment Resources.

B.  

Documented that Finley Motors has a legitimate interest to share Chuck’s information.

C.  

Obtained verbal consent from Chuck and recorded it within internal systems.

D.  

Provided notice of data sharing practices within the electronically signed rental agreement.

Discussion 0
Questions 3

What Privacy by Design (PbD) element should include a de-identification or deletion plan?

Options:

A.  

Categorization.

B.  

Remediation.

C.  

Retention.

D.  

Security

Discussion 0
Questions 4

An organization is launching a new online subscription-based publication. As the service is not aimed at children, users are asked for their date of birth as part of the of the sign-up process. The privacy technologist suggests it may be more appropriate ask if an individual is over 18 rather than requiring they provide a date of birth. What kind of threat is the privacy technologist concerned about?

Options:

A.  

Identification.

B.  

Insecurity.

C.  

Interference.

D.  

Minimization.

Discussion 0
Questions 5

When writing security policies, the most important consideration is to?

Options:

A.  

Require all employees to read and acknowledge their understanding.

B.  

Ensure they are based on the organization's risk profile.

C.  

Ensure they cover enough details for common situations.

D.  

Follow industry best practices.

Discussion 0
Questions 6

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

    Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

    The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

    DES is the strongest encryption algorithm currently used for any file.

    Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

    Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which is true regarding the type of encryption Lancelot uses?

Options:

A.  

It employs the data scrambling technique known as obfuscation.

B.  

Its decryption key is derived from its encryption key.

C.  

It uses a single key for encryption and decryption.

D.  

It is a data masking methodology.

Discussion 0
Questions 7

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) for the new Light Blue Health application currently in development. Which of the following best describes a risk that is likely to result in a privacy breach?

Options:

A.  

Limiting access to the app to authorized personnel.

B.  

Including non-transparent policies, terms and conditions in the app.

C.  

Insufficiently deleting personal data after an account reaches its retention period.

D.  

Not encrypting the health record when it is transferred to the Light Blue Health servers.

Discussion 0
Questions 8

Data oriented strategies Include which of the following?

Options:

A.  

Minimize. Separate, Abstract, Hide.

B.  

Inform, Control, Enforce, Demonstrate.

C.  

Encryption, Hashing, Obfuscation, Randomization.

D.  

Consent. Contract, Legal Obligation, Legitimate interests.

Discussion 0
Questions 9

Why is first-party web tracking very difficult to prevent?

Options:

A.  

The available tools to block tracking would break most sites’ functionality.

B.  

Consumers enjoy the many benefits they receive from targeted advertising.

C.  

Regulatory frameworks are not concerned with web tracking.

D.  

Most browsers do not support automatic blocking.

Discussion 0
Questions 10

Which of the following is NOT a workplace surveillance best practice?

Options:

A.  

Check local privacy laws before putting surveillance in place.

B.  

Ensure surveillance is discreet so employees do not alter their behavior.

C.  

Once surveillance data has been gathered, limit exposure of the content.

D.  

Ensure the minimal amount of surveillance is performed to meet the objective.

Discussion 0
Questions 11

Which of the following activities would be considered the best method for an organization to achieve the privacy principle of data quality'?

Options:

A.  

Clash customer information with information from a data broker

B.  

Build a system with user access controls and approval workflows to edit customer data

C.  

Set a privacy notice covering the purpose for collection of a customer's data

D.  

Provide a customer with a copy of their data in a machine-readable format

Discussion 0
Questions 12

What is the potential advantage of homomorphic encryption?

Options:

A.  

Encrypted information can be analyzed without decrypting it first.

B.  

Ciphertext size decreases as the security level increases.

C.  

It allows greater security and faster processing times.

D.  

It makes data impenetrable to attacks.

Discussion 0
Questions 13

Which of the following methods does NOT contribute to keeping the data confidential?

Options:

A.  

Differential privacy.

B.  

Homomorphic encryption.

C.  

K-anonymity.

D.  

Referential integrity.

Discussion 0
Questions 14

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the strongest method for authenticating Chuck’s identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

Options:

A.  

By requiring Chuck use the last 4 digits of his driver’s license number in combination with a unique PIN provided within the violation notice.

B.  

By requiring Chuck use his credit card number in combination with the last 4 digits of his driver’s license.

C.  

By requiring Chuck use the rental agreement number in combination with his email address.

D.  

By requiring Chuck to call AMP Payment Resources directly and provide his date of birth and home address.

Discussion 0
Questions 15

Which of the following is an example of drone “swarming”?

Options:

A.  

A drone filming a cyclist from above as he rides.

B.  

A drone flying over a building site to gather data.

C.  

Drones delivering retailers’ packages to private homes.

D.  

Drones communicating with each other to perform a search and rescue.

Discussion 0
Questions 16

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

What is a key consideration for assessing external service providers like LeadOps, which will conduct personal information processing operations on Clean-Q's behalf?

Options:

A.  

Understanding LeadOps’ costing model.

B.  

Establishing a relationship with the Managing Director of LeadOps.

C.  

Recognizing the value of LeadOps’ website holding a verified security certificate.

D.  

Obtaining knowledge of LeadOps' information handling practices and information security environment.

Discussion 0
Questions 17

of the following best describes a network threat model and Its uses?

Options:

A.  

It Is used in software development to detect programming errors. .

B.  

It is a risk-based model used to calculate the probabilities of risks identified during vulnerability tests.

C.  

It helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.

D.  

It combines the results of vulnerability and penetration tests to provide useful insights into the network's overall threat and security posture.

Discussion 0
Questions 18

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?

Options:

A.  

The data and recipients for medical research are not specified

B.  

Insufficient information is provided on notifications and infection alerts

C.  

The sharing of information with an affiliated healthcare provider is too risky

D.  

Allowing users to share risk result information for exposure and contact tracing purposes

Discussion 0
Questions 19

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

The app is designed to collect and transmit geolocation data. How can data collection best be limited to the necessary minimum?

Options:

A.  

Allow user to opt-out geolocation data collection at any time.

B.  

Allow access and sharing of geolocation data only after an accident occurs.

C.  

Present a clear and explicit explanation about need for the geolocation data.

D.  

Obtain consent and capture geolocation data at all times after consent is received.

Discussion 0
Questions 20

In day to day interactions with technology, consumers are presented with privacy choices. Which of the following best represents the Privacy by Design (PbD) methodology of letting the user choose a non-zero-sum choice?

Options:

A.  

Using images, words, and contexts to elicit positive feelings that result in proactive behavior, thus eliminating negativity and biases.

B.  

Providing plain-language design choices that elicit privacy-related responses, helping users avoid errors and minimize the negative consequences of errors when they do occur.

C.  

Displaying the percentage of users that chose a particular option, thus enabling the user to choose the most preferred option.

D.  

Using contexts, antecedent events, and other priming concepts to assist the user in making a better privacy choice.

Discussion 0
Questions 21

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Why is Jordan’s claim that the company does not collect personal information as identified by the GDPR inaccurate?

Options:

A.  

The potential customers must browse for products online.

B.  

The fitness trackers capture sleep and heart rate data to monitor an individual’s behavior.

C.  

The website collects the customers’ and users’ region and country information.

D.  

The customers must pair their fitness trackers to either smartphones or computers.

Discussion 0
Questions 22

Which activity would best support the principle of data quality?

Options:

A.  

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.  

Ensuring that the number of teams processing personal information is limited.

C.  

Delivering information in a format that the data subject understands.

D.  

Ensuring that information remains accurate.

Discussion 0
Questions 23

A company seeking to hire engineers in Silicon Valley ran an ad campaign targeting women in a specific age range who live in the San Francisco Bay Area.

Which Calo objective privacy harm is likely to result from this campaign?

Options:

A.  

Lost opportunity.

B.  

Economic loss.

C.  

Loss of liberty.

D.  

Social detriment.

Discussion 0
Questions 24

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

Options:

A.  

Implementing a mandatory privacy review and legal approval process.

B.  

Obtain leadership buy-in for a mandatory privacy review and approval process.

C.  

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.

D.  

Conduct annual Privacy by Design training and refreshers for all impacted personnel.

Discussion 0
Questions 25

Which technique is most likely to facilitate the deletion of every instance of data associated with a deleted user account from every data store held by an organization?

Options:

A.  

Auditing the code which deletes user accounts.

B.  

Building a standardized and documented retention program for user data deletion.

C.  

Monitoring each data store for presence of data associated with the deleted user account.

D.  

Training engineering teams on the importance of deleting user accounts their associated data from all data stores when requested.

Discussion 0
Questions 26

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

Options:

A.  

The Open ID Federation.

B.  

PCI Data Security Standards Council

C.  

International Organization for Standardization.

D.  

Personal Information Protection and Electronic Documents Act.

Discussion 0
Questions 27

Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?

Options:

A.  

A group of hackers infiltrate a power grid and cause a major blackout.

B.  

An insurance company raises a person’s rates based on driving habits gathered from a connected car.

C.  

A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits.

D.  

A water district fines an individual after a meter reading reveals excess water use during drought conditions.

Discussion 0
Questions 28

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

Options:

A.  

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.  

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.  

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.  

By hand coding software routines with a specific set of instructions to accomplish a task.

Discussion 0
Questions 29

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?

Options:

A.  

Unseen web beacons that combine information on multiple users.

B.  

Latent keys that trigger malware when an advertisement is selected.

C.  

Personal information collected by cookies linked to the advertising network.

D.  

Sensitive information from Structured Query Language (SQL) commands that may be exposed.

Discussion 0
Questions 30

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Which of the following should Kyle recommend to Jill as the best source of support for her initiative?

Options:

A.  

Investors.

B.  

Regulators.

C.  

Industry groups.

D.  

Corporate researchers.

Discussion 0
Questions 31

Which of the following is a privacy consideration for NOT sending large-scale SPAM type emails to a database of email addresses?

Options:

A.  

Poor user experience.

B.  

Emails are unsolicited.

C.  

Data breach notification.

D.  

Reduction in email deliverability score.

Discussion 0
Questions 32

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?

Options:

A.  

Configuring the environment to use shorter error messages.

B.  

Handing exceptions internally and not displaying errors to the user.

C.  

Creating default error pages or error messages which do not include variable data.

D.  

Logging the session name and necessary parameters once the error occurs to enable trouble shooting.

Discussion 0
Questions 33

SCENARIO

Kyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company's information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle's schedule included participating in meetings and observing work in the IT and compliance departments.

Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization's wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.

Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.

By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.

Ted's implementation is most likely a response to what incident?

Options:

A.  

Encryption keys were previously unavailable to the organization's cloud storage host.

B.  

Signatureless advanced malware was detected at multiple points on the organization's networks.

C.  

Cyber criminals accessed proprietary data by running automated authentication attacks on the organization's network.

D.  

Confidential information discussed during a strategic teleconference was intercepted by the organization's top competitor.

Discussion 0
Questions 34

SCENARIO

Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks.

As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, “I don't know what you are doing, but keep doing it!"

But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions.

At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. “Carol, I know that he doesn't realize it, but some of Sam’s efforts to increase sales have put you in a vulnerable position. You are not protecting customers’ personal information like you should.”

Sam said, “I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers’ names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase.”

Carol replied, “Jane, that doesn’t sound so bad. Could you just fix things and help us to post even more online?"

‘I can," said Jane. “But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy.”

Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. “Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand."

Which regulator has jurisdiction over the shop's data management practices?

Options:

A.  

The Federal Trade Commission.

B.  

The Department of Commerce.

C.  

The Data Protection Authority.

D.  

The Federal Communications Commission.

Discussion 0
Questions 35

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?

Options:

A.  

Verify that WebTracker's HR and Payroll systems implement the current privacy notice (after the typos are fixed).

B.  

Review the list of subcontractors employed by AmaZure and ensure these are included in the formal agreement with WebTracker.

C.  

Evaluate and review the basis for processing employees’ personal data in the context of the prototype created by WebTracker and approved by the CEO.

D.  

Confirm whether the data transfer from London to the USA has been fully approved by AmaZure and the appropriate institutions in the USA and the European Union.

Discussion 0
Questions 36

What is the most important requirement to fulfill when transferring data out of an organization?

Options:

A.  

Ensuring the organization sending the data controls how the data is tagged by the receiver.

B.  

Ensuring the organization receiving the data performs a privacy impact assessment.

C.  

Ensuring the commitments made to the data owner are followed.

D.  

Extending the data retention schedule as needed.

Discussion 0
Questions 37

An organization is deciding between building a solution in-house versus purchasing a solution for a new customer facing application. When security threat are taken into consideration, a key advantage of purchasing a solution would be the availability of?

Options:

A.  

Outsourcing.

B.  

Persistent VPN.

C.  

Patching and updates.

D.  

Digital Rights Management.

Discussion 0
Questions 38

Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India. The Aadhaar database contains the Aadhaar number, name, date of birth, gender and address of over 1 billion individuals.

Which of the following datasets derived from that data would be considered the most de-identified?

Options:

A.  

A count of the years of birth and hash of the person’ s gender.

B.  

A count of the month of birth and hash of the person's first name.

C.  

A count of the day of birth and hash of the person’s first initial of their first name.

D.  

Account of the century of birth and hash of the last 3 digits of the person's Aadhaar number.

Discussion 0
Questions 39

SCENARIO

Tom looked forward to starting his new position with a U.S —based automobile leasing company (New Company), now operating in 32 states. New Company was recently formed through the merger of two prominent players, one from the eastern region (East Company) and one from the western region (West Company). Tom, a Certified Information Privacy Technologist (CIPT), is New Company's first Information Privacy and Security Officer. He met today with Dick from East Company, and Harry, from West Company. Dick and Harry are veteran senior information privacy and security professionals at their respective companies, and continue to lead the east and west divisions of New Company. The purpose of the meeting was to conduct a SWOT (strengths/weaknesses/opportunities/threats) analysis for New Company. Their SWOT analysis conclusions are summarized below.

Dick was enthusiastic about an opportunity for the New Company to reduce costs and increase computing power and flexibility through cloud services. East Company had been contemplating moving to the cloud, but West Company already had a vendor that was providing it with software-as-a-service (SaaS). Dick was looking forward to extending this service to the eastern region. Harry noted that this was a threat as well, because West Company had to rely on the third party to protect its data.

Tom mentioned that neither of the legacy companies had sufficient data storage space to meet the projected growth of New Company, which he saw as a weakness. Tom stated that one of the team's first projects would be to construct a consolidated New Company data warehouse. Tom would personally lead this project and would be held accountable if information was modified during transmission to or during storage in the new data warehouse.

Tom, Dick and Harry agreed that employee network access could be considered both a strength and a weakness. East Company and West Company had strong performance records in this regard; both had robust network access controls that were working as designed. However, during a projected year-long transition period, New Company employees would need to be able to connect to a New Company network while retaining access to the East Company and West Company networks.

Which statement is correct about addressing New Company stakeholders’ expectations for privacy?

Options:

A.  

New Company should expect consumers to read the company’s privacy policy.

B.  

New Company should manage stakeholder expectations for privacy even when the stakeholders‘ data is not held by New Company.

C.  

New Company would best meet consumer expectations for privacy by adhering to legal requirements.

D.  

New Company's commitment to stakeholders ends when the stakeholders’ data leaves New Company.

Discussion 0
Questions 40

After stringent testing an organization has launched a new web-facing ordering system for its consumer medical products. As the medical products could provide indicators of health conditions, the organization could further strengthen its privacy controls by deploying?

Options:

A.  

Run time behavior monitoring.

B.  

A content delivery network.

C.  

Context aware computing.

D.  

Differential identifiability.

Discussion 0
Questions 41

What term describes two re-identifiable data sets that both come from the same unidentified individual?

Options:

A.  

Pseudonymous data.

B.  

Anonymous data.

C.  

Aggregated data.

D.  

Imprecise data.

Discussion 0
Questions 42

A privacy engineer reviews a newly developed on-line registration page on a company’s website. The purpose of the page is to enable corporate customers to submit a returns / refund request for physical goods. The page displays the following data capture fields: company name, account reference, company address, contact name, email address, contact phone number, product name, quantity, issue description and company bank account details.

After her review, the privacy engineer recommends setting certain capture fields as “non-mandatory”. Setting which of the following fields as “non-mandatory” would be the best example of the principle of data minimization?

Options:

A.  

The contact phone number field.

B.  

The company address and name.

C.  

The contact name and email address.

D.  

The company bank account detail field.

Discussion 0
Questions 43

Which of the following does NOT illustrate the ‘respect to user privacy’ principle?

Options:

A.  

Implementing privacy elements within the user interface that facilitate the use of technology by any visually-challenged users.

B.  

Enabling Data Subject Access Request (DSARs) that provide rights for correction, deletion, amendment and rectification of personal information.

C.  

Developing a consent management self-service portal that enables the data subjects to review the details of consent provided to an organization.

D.  

Filing breach notification paperwork with data protection authorities which detail the impact to data subjects.

Discussion 0
Questions 44

Which of the following would be an example of an "objective" privacy harm to an individual, based on Calo's Harm Dimensions?

Options:

A.  

Receiving spam following the sale of an email address.

B.  

Negative feelings derived from government surveillance.

C.  

Social media profile views indicating unexpected interest in a person.

D.  

Personal data inaccuracies present in a user's social media profile.

Discussion 0
Questions 45

Which of the following statements best describes the relationship between privacy and security?

Options:

A.  

Security systems can be used to enforce compliance with privacy policies.

B.  

Privacy and security are independent; organizations must decide which should by emphasized.

C.  

Privacy restricts access to personal information; security regulates how information should be used.

D.  

Privacy protects data from being viewed during collection and security governs how collected data should be shared.

Discussion 0
Questions 46

What is the key idea behind the "flow" component of Nissenbaum's contextual integrity model?

Options:

A.  

The flow of information from one actor to another.

B.  

The integrity of information during each stage of the data lifecycle.

C.  

The maintenance of accuracy when personal information is transmitted.

D.  

The movement of personal information within a particular context or domain.

Discussion 0
Questions 47

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Based on the current features of the fitness watch, what would you recommend be implemented into each device in order to most effectively ensure privacy?

Options:

A.  

Hashing.

B.  

A2DP Bluetooth profile.

C.  

Persistent unique identifier.

D.  

Randomized MAC address.

Discussion 0
Questions 48

Many modern vehicles incorporate technologies that increase the convenience of drivers, but collect information about driver behavior in order to Implement this. What should vehicle manufacturers prioritize to ensure enhanced privacy protection for drivers?

Options:

A.  

Share the sensitive data collected about driver behavior with the driver.

B.  

Derive implicit consent for the processing of sensitive data by the continued use of the vehicle.

C.  

Obtain affirmative consent for processing of sensitive data about the driver.

D.  

Provide easy to read, in-vehicle instructions about how to use the technology.

Discussion 0
Questions 49

What is the main benefit of using a private cloud?

Options:

A.  

The ability to use a backup system for personal files.

B.  

The ability to outsource data support to a third party.

C.  

The ability to restrict data access to employees and contractors.

D.  

The ability to cut costs for storing, maintaining, and accessing data.

Discussion 0
Questions 50

Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?

Options:

A.  

Express consent.

B.  

Implied consent.

C.  

Informed notice.

D.  

Authorized notice.

Discussion 0
Questions 51

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Which of the following issues is most likely to require an investigation by the Chief Privacy Officer (CPO) of WebTracker?

Options:

A.  

Data flows use encryption for data at rest, as defined by the IT manager.

B.  

AmaZure sends newsletter to WebTracker customers, as approved by the Marketing Manager.

C.  

Employees’ personal data are being stored in a cloud HR system, as approved by the HR Manager.

D.  

File Integrity Monitoring is being deployed in SQL servers, as indicated by the IT Architect Manager.

Discussion 0
Questions 52

What tactic does pharming use to achieve its goal?

Options:

A.  

It modifies the user's Hosts file.

B.  

It encrypts files on a user's computer.

C.  

It creates a false display advertisement.

D.  

It generates a malicious instant message.

Discussion 0
Questions 53

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

What would be the best way to supervise the third-party systems the EnsureClaim App will share data with?

Options:

A.  

Review the privacy notices for each third-party that the app will share personal data with to determine adequate privacy and data protection controls are in place.

B.  

Conduct a security and privacy review before onboarding new vendors that collect personal data from the app.

C.  

Anonymize all personal data collected by the app before sharing any data with third-parties.

D.  

Develop policies and procedures that outline how data is shared with third-party apps.

Discussion 0
Questions 54

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information?

Options:

A.  

Individual participation.

B.  

Purpose specification.

C.  

Collection limitation.

D.  

Accountability.

Discussion 0
Questions 55

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

Regarding the app, which action is an example of a decisional interference violation?

Options:

A.  

The app asks income level to determine the treatment of care.

B.  

The app sells aggregated data to an advertising company without prior consent.

C.  

The app has a pop-up ad requesting sign-up for a pharmaceutical company newsletter.

D.  

The app asks questions during account set-up to disclose family medical history that is not necessary for the treatment of the individual’s symptoms.

Discussion 0
Questions 56

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

Options:

A.  

Encryption.

B.  

Access Controls.

C.  

De-identification.

D.  

Multi-factor authentication.

Discussion 0
Questions 57

A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?

Options:

A.  

Geofencing

B.  

Geo-tracking

C.  

Geo-tagging

D.  

Geolocation

Discussion 0
Questions 58

An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?

Options:

A.  

Transfer the data to another location.

B.  

Invoke the appropriate deletion clause in the cloud terms and conditions.

C.  

Obtain a destruction certificate from the cloud vendor.

D.  

Destroy all encryption keys associated with the data.

Discussion 0
Questions 59

SCENARIO

Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed in-house by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed.

The table below indicates some of the personal information Clean-Q requires as part of its business operations:

Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.

With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q's traditional supply and demand system that has caused some overlapping bookings.

Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.

The Managing Director opted to initiate the process to integrate Clean-Q's operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.

    A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.

    A resource facing web interface that enables resources to apply and manage their assigned jobs.

    An online payment facility for customers to pay for services.

If Clean-Q were to utilize LeadOps' services, what is a contract clause that may be included in the agreement entered into with LeadOps?

Options:

A.  

A provision that holds LeadOps liable for a data breach involving Clean-Q's information.

B.  

A provision prescribing technical and organizational controls that LeadOps must implement.

C.  

A provision that requires LeadOps to notify Clean-Q of any suspected breaches of information that involves customer or resource information managed on behalf of Clean-Q.

D.  

A provision that allows Clean-Q to conduct audits of LeadOps’ information processing and information security environment, at LeadOps’ cost and at any time that Clean-Q requires.

Discussion 0
Questions 60

What has been identified as a significant privacy concern with chatbots?

Options:

A.  

Most chatbot providers do not agree to code audits

B.  

Chatbots can easily verify the identity of the contact.

C.  

Users’ conversations with chatbots are not encrypted in transit.

D.  

Chatbot technology providers may be able to read chatbot conversations with users.

Discussion 0
Questions 61

An organization is considering launching enhancements to improve security and authentication mechanisms in their products. To better identify the user and reduce friction from the authentication process, they plan to track physical attributes of an individual. A privacy technologist assessing privacy implications would be most interested in which of the following?

Options:

A.  

The purpose of the data tracking.

B.  

That the individual is aware tracking is occurring.

C.  

The authentication mechanism proposed.

D.  

The encryption of individual physical attributes.

Discussion 0
Questions 62

What risk is mitigated when routing video traffic through a company’s application servers, rather than sending the video traffic directly from one user to another?

Options:

A.  

The user is protected against phishing attacks.

B.  

The user’s identity is protected from the other user.

C.  

The user’s approximate physical location is hidden from the other user.

D.  

The user is assured that stronger authentication methods have been used.

Discussion 0
Questions 63

How can a hacker gain control of a smartphone to perform remote audio and video surveillance?

Options:

A.  

By performing cross-site scripting.

B.  

By installing a roving bug on the phone.

C.  

By manipulating geographic information systems.

D.  

By accessing a phone's global positioning system satellite signal.

Discussion 0
Questions 64

Which is NOT a suitable action to apply to data when the retention period ends?

Options:

A.  

Aggregation.

B.  

De-identification.

C.  

Deletion.

D.  

Retagging.

Discussion 0
Questions 65

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?

Options:

A.  

Limited-retention, de-identified logs including only metadata.

B.  

Limited-retention, de-identified logs including the links clicked in messages as well as metadata.

C.  

Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.

D.  

Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.

Discussion 0
Questions 66

Organizations understand there are aggregation risks associated with the way the process their customer’s data. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

Options:

A.  

Risk transfer.

B.  

Risk mitigation.

C.  

Risk avoidance.

D.  

Risk acceptance.

Discussion 0