New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

IAPP CIPT Certified Information Privacy Technologist Exam Practice Test

Page: 1 / 22
Total 220 questions

Certified Information Privacy Technologist Questions and Answers

Question 1

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?

Options:

A.

Symmetric Encryption

B.

Tokenization

C.

Obfuscation

D.

Certificates

Question 2

Truncating the last octet of an IP address because it is NOT needed is an example of which privacy principle?

Options:

A.

Use Limitation

B.

Data Minimization

C.

Purpose Limitation

D.

Security Safeguards

Question 3

Organizations understand there are aggregation risks associated with the way the process their customer’s data. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

Options:

A.

Risk transfer.

B.

Risk mitigation.

C.

Risk avoidance.

D.

Risk acceptance.

Question 4

Which of the following is the most important action to take prior to collecting personal data directly from a customer?

Options:

A.

Define what data needs to be collected.

B.

Define the purpose for collecting and using the data.

C.

Identify business requirements for the data that will be collected.

D.

Provide individuals with information about how their data will be used after collection.

Question 5

An organization is launching a new online subscription-based publication. As the service is not aimed at children, users are asked for their date of birth as part of the of the sign-up process. The privacy technologist suggests it may be more appropriate ask if an individual is over 18 rather than requiring they provide a date of birth. What kind of threat is the privacy technologist concerned about?

Options:

A.

Identification.

B.

Insecurity.

C.

Interference.

D.

Minimization.

Question 6

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which technology is best suited for the contact tracing feature of the app1?

Options:

A.

Bluetooth

B.

Deep learning

C.

Near Field Communication (NFC)

D.

Radio-Frequency Identification (RFID)

Question 7

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

Options:

A.

Relationship of family member

B.

Phone number

C.

Dale of birth

D.

Citizenship

Question 8

How can a hacker gain control of a smartphone to perform remote audio and video surveillance?

Options:

A.

By performing cross-site scripting.

B.

By installing a roving bug on the phone.

C.

By manipulating geographic information systems.

D.

By accessing a phone's global positioning system satellite signal.

Question 9

What is the distinguishing feature of asymmetric encryption?

Options:

A.

It has a stronger key for encryption than for decryption.

B.

It employs layered encryption using dissimilar methods.

C.

It uses distinct keys for encryption and decryption.

D.

It is designed to cross operating systems.

Question 10

Which of the following is NOT a step in the methodology of a privacy risk framework?

Options:

A.

Assessment.

B.

Monitoring.

C.

Response.

D.

Ranking.

Question 11

What is the term for information provided to a social network by a member?

Options:

A.

Profile data.

B.

Declared data.

C.

Personal choice data.

D.

Identifier information.

Question 12

Which of the following would be an example of an "objective" privacy harm to an individual?

Options:

A.

Receiving spam following the sale an of email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Inaccuracies in personal data.

Question 13

An organization is launching a new smart speaker to the market. The device will have the capability to play music and provide news and weather updates. Which of the following would be a concern from a privacy perspective?

Options:

A.

Appropriation.

B.

Browser Fingerprinting.

C.

Context of authority.

D.

Context aware computing.

Question 14

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

The location data collected and displayed on the map should be changed for which of the following reasons?

Options:

A.

The blurriness does not allow users to know how close they are to an infected person

B.

The radius used for location data exceeds official social distancing rules

C.

The location data has not been pseudonymized

D.

The location data is loo precise

Question 15

What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?

Options:

A.

The ad being served to the user may not be relevant.

B.

The user’s sensitive personal information is used to display targeted ads.

C.

The personal information used to target ads can be discerned by the server.

D.

The user’s information can be leaked to an advertiser through weak de-identification techniques.

Question 16

Revocation and reissuing of compromised credentials is impossible for which of the following authentication techniques?

Options:

A.

Biometric data.

B.

Picture passwords.

C.

Personal identification number.

D.

Radio frequency identification.

Question 17

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

    Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

    The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

    DES is the strongest encryption algorithm currently used for any file.

    Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

    Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

Options:

A.

Privacy audit.

B.

Log collection

C.

Data inventory.

D.

Data classification.

Question 18

Which activity best supports the principle of data quality from a privacy perspective?

Options:

A.

Ensuring the data is classified.

B.

Protecting the data against unauthorized access.

C.

Ensuring the data is available for use.

D.

Protecting the data against unauthorized changes.

Question 19

Which of the following CANNOT be effectively determined during a code audit?

Options:

A.

Whether access control logic is recommended in all cases.

B.

Whether data is being incorrectly shared with a third-party.

C.

Whether consent is durably recorded in the case of a server crash.

D.

Whether the differential privacy implementation correctly anonymizes data.

Question 20

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user’s region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any “offering goods or services” in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no “offering” from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company’s servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Why is Jordan’s claim that the company does not collect personal information as identified by the GDPR inaccurate?

Options:

A.

The potential customers must browse for products online.

B.

The fitness trackers capture sleep and heart rate data to monitor an individual’s behavior.

C.

The website collects the customers’ and users’ region and country information.

D.

The customers must pair their fitness trackers to either smartphones or computers.

Question 21

Which of the following statements is true regarding software notifications and agreements?

Options:

A.

Website visitors must view the site’s privacy statement before downloading software.

B.

Software agreements are designed to be brief, while notifications provide more details.

C.

It is a good practice to provide users with information about privacy prior to software installation.

D.

“Just in time” software agreement notifications provide users with a final opportunity to modify the agreement.

Question 22

A credit card with the last few numbers visible is an example of what?

Options:

A.

Masking data

B.

Synthetic data

C.

Sighting controls.

D.

Partial encryption

Question 23

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Which of the following issues is most likely to require an investigation by the Chief Privacy Officer (CPO) of WebTracker?

Options:

A.

Data flows use encryption for data at rest, as defined by the IT manager.

B.

AmaZure sends newsletter to WebTracker customers, as approved by the Marketing Manager.

C.

Employees’ personal data are being stored in a cloud HR system, as approved by the HR Manager.

D.

File Integrity Monitoring is being deployed in SQL servers, as indicated by the IT Architect Manager.

Question 24

Which of the following would be an example of an "objective" privacy harm to an individual, based on Calo's Harm Dimensions?

Options:

A.

Receiving spam following the sale of an email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Personal data inaccuracies present in a user's social media profile.

Question 25

Which is NOT a way to validate a person's identity?

Options:

A.

Swiping a smartcard into an electronic reader.

B.

Using a program that creates random passwords.

C.

Answering a question about "something you know”.

D.

Selecting a picture and tracing a unique pattern on it

Question 26

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

Options:

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Question 27

What is the main privacy threat posed by Radio Frequency Identification (RFID)?

Options:

A.

RFID can be utilized to track people or consumer products

B.

RFID can be utilized to gam unauthorized access to an individual's device

C.

RFID can be utilized to spoof identification details

D.

RFID can be utilized to read information from a device without the user's knowledge

Question 28

When writing security policies, the most important consideration is to?

Options:

A.

Require all employees to read and acknowledge their understanding.

B.

Ensure they are based on the organization's risk profile.

C.

Ensure they cover enough details for common situations.

D.

Follow industry best practices.

Question 29

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?

Options:

A.

Limited-retention, de-identified logs including only metadata.

B.

Limited-retention, de-identified logs including the links clicked in messages as well as metadata.

C.

Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.

D.

Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.

Question 30

Which of the following activities would be considered the best method for an organization to achieve the privacy principle of data quality'?

Options:

A.

Clash customer information with information from a data broker

B.

Build a system with user access controls and approval workflows to edit customer data

C.

Set a privacy notice covering the purpose for collection of a customer's data

D.

Provide a customer with a copy of their data in a machine-readable format

Question 31

Combining multiple pieces of information about an individual to produce a whole that is greater than the sum of its parts is called?

Options:

A.

Identification.

B.

Insecurity.

C.

Aggregation.

D.

Exclusion.

Question 32

Which of the following suggests the greatest degree of transparency?

Options:

A.

A privacy disclosure statement clearly articulates general purposes for collection

B.

The data subject has multiple opportunities to opt-out after collection has occurred.

C.

A privacy notice accommodates broadly defined future collections for new products.

D.

After reading the privacy notice, a data subject confidently infers how her information will be used.

Question 33

What risk is mitigated when routing meeting video traffic through a company’s application servers rather than sending the video traffic directly from one user to another?

Options:

A.

The user's identity is protected from the other user

B.

The user is protected against cyberstalking attacks

C.

The user's IP address is hidden from the other user

D.

The user is assured that stronger authentication methods have been used

Question 34

A privacy engineer reviews a newly developed on-line registration page on a company’s website. The purpose of the page is to enable corporate customers to submit a returns / refund request for physical goods. The page displays the following data capture fields: company name, account reference, company address, contact name, email address, contact phone number, product name, quantity, issue description and company bank account details.

After her review, the privacy engineer recommends setting certain capture fields as “non-mandatory”. Setting which of the following fields as “non-mandatory” would be the best example of the principle of data minimization?

Options:

A.

The contact phone number field.

B.

The company address and name.

C.

The contact name and email address.

D.

The company bank account detail field.

Question 35

Granting data subjects the right to have data corrected, amended, or deleted describes?

Options:

A.

Use limitation.

B.

Accountability.

C.

A security safeguard

D.

Individual participation

Question 36

A vendor has been collecting data under an old contract, not aligned with the practices of the organization.

Which is the preferred response?

Options:

A.

Destroy the data

B.

Update the contract to bring the vendor into alignment.

C.

Continue the terms of the existing contract until it expires.

D.

Terminate the contract and begin a vendor selection process.

Question 37

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

What measures can protect client information stored at GFDC?

Options:

A.

De-linking of data into client-specific packets.

B.

Cloud-based applications.

C.

Server-side controls.

D.

Data pruning

Question 38

Which of the following statements describes an acceptable disclosure practice?

Options:

A.

An organization’s privacy policy discloses how data will be used among groups within the organization itself.

B.

With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.

C.

Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.

D.

When an organization discloses data to a vendor, the terms of the vendor’ privacy notice prevail over the organization’ privacy notice.

Question 39

What element is most conducive to fostering a sound privacy by design culture in an organization?

Options:

A.

Ensuring all employees acknowledge and understood the privacy policy.

B.

Frequent privacy and security awareness training for employees.

C.

Monthly reviews of organizational privacy principles.

D.

Gaining advocacy from senior management.

Question 40

Implementation of privacy controls for compliance with the requirements of the Children’s Online Privacy Protection Act (COPPA) is necessary for all the following situations EXCEPT?

Options:

A.

A virtual jigsaw puzzle game marketed for ages 5-9 displays pieces of the puzzle on a handheld screen. Once the child completes a certain level, it flashes a message about new themes released that day.

B.

An interactive toy copies a child’s behavior through gestures and kid-friendly sounds. It runs on battery power and automatically connects to a base station at home to charge itself.

C.

A math tutoring service commissioned an advertisement on a bulletin board inside a charter school. The service makes it simple to reach out to tutors through a QR-code shaped like a cartoon character.

D.

A note-taking application converts hard copies of kids’ class notes into audio books in seconds. It does so by using the processing power of idle server farms.

Question 41

When analyzing user data, how is differential privacy applied?

Options:

A.

By injecting noise into aggregated datasets.

B.

By assessing differences between datasets.

C.

By applying asymmetric encryption to datasets.

D.

By removing personal identifiers from datasets.

Question 42

During a transport layer security (TLS) session, what happens immediately after the web browser creates a random PreMasterSecret?

Options:

A.

The server decrypts the PremasterSecret.

B.

The web browser opens a TLS connection to the PremasterSecret.

C.

The web browser encrypts the PremasterSecret with the server's public key.

D.

The server and client use the same algorithm to convert the PremasterSecret into an encryption key.

Question 43

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

How can Finley Motors reduce the risk associated with transferring Chuck’s personal information to AMP Payment Resources?

Options:

A.

By providing only the minimum necessary data to process the violation notice and masking all other information prior to transfer.

B.

By requesting AMP Payment Resources delete unnecessary datasets and only utilize what is necessary to process the violation notice.

C.

By obfuscating the minimum necessary data to process the violation notice and require AMP Payment Resources to secure store the personal information.

D.

By transferring all information to separate datafiles and requiring AMP Payment Resources to combine the datasets during processing of the violation notice.

Question 44

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

    Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

    The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

    DES is the strongest encryption algorithm currently used for any file.

    Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

    Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which is true regarding the type of encryption Lancelot uses?

Options:

A.

It employs the data scrambling technique known as obfuscation.

B.

Its decryption key is derived from its encryption key.

C.

It uses a single key for encryption and decryption.

D.

It is a data masking methodology.

Question 45

What was the first privacy framework to be developed?

Options:

A.

OECD Privacy Principles.

B.

Generally Accepted Privacy Principles.

C.

Code of Fair Information Practice Principles (FIPPs).

D.

The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.

Question 46

SCENARIO

WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker.

The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll.

This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker.

To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks.

The results of this initial work include the following notes:

    There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome.

    You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure.

    There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system.

    Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker.

    All the WebTracker and SmartHome customers are based in USA and Canada.

Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?

Options:

A.

Verify that WebTracker's HR and Payroll systems implement the current privacy notice (after the typos are fixed).

B.

Review the list of subcontractors employed by AmaZure and ensure these are included in the formal agreement with WebTracker.

C.

Evaluate and review the basis for processing employees’ personal data in the context of the prototype created by WebTracker and approved by the CEO.

D.

Confirm whether the data transfer from London to the USA has been fully approved by AmaZure and the appropriate institutions in the USA and the European Union.

Question 47

Which of the following methods does NOT contribute to keeping the data confidential?

Options:

A.

Differential privacy.

B.

Homomorphic encryption.

C.

K-anonymity.

D.

Referential integrity.

Question 48

SCENARIO

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the Berry Country Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You also recall a recent visit to the Records Storage Section, often termed “The Dungeon” in the basement of the old hospital next to the modern facility, where you noticed a multitude of paper records. Some of these were in crates marked by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. The back shelves of the section housed data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the dungeon, you noticed just ahead of you a small man in a lab coat who you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system?

Options:

A.

Asymmetric Encryption

B.

Symmetric Encryption

C.

Obfuscation

D.

Hashing

Question 49

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

Why would you recommend that GFC use record encryption rather than disk, file or table encryption?

Options:

A.

Record encryption is asymmetric, a stronger control measure.

B.

Record encryption is granular, limiting the damage of potential breaches.

C.

Record encryption involves tag masking, so its metadata cannot be decrypted

D.

Record encryption allows for encryption of personal data only.

Question 50

Which of the following is a privacy consideration for NOT sending large-scale SPAM type emails to a database of email addresses?

Options:

A.

Poor user experience.

B.

Emails are unsolicited.

C.

Data breach notification.

D.

Reduction in email deliverability score.

Question 51

What is a main benefit of data aggregation?

Options:

A.

It is a good way to perform analysis without needing a statistician.

B.

It applies two or more layers of protection to a single data record.

C.

It allows one to draw valid conclusions from small data samples.

D.

It is a good way to achieve de-identification and unlinkabilty.

Question 52

Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?

Options:

A.

Develop a technical privacy framework that integrates with the development lifecycle.

B.

Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.

C.

Identify the privacy requirements as a part of the Privacy Impact Assessment (PIA) process during development and evaluation stages.

D.

Develop training programs that aid the developers in understanding how to turn privacy requirements into actionable code and design level specifications.

Question 53

Which of the following is NOT a workplace surveillance best practice?

Options:

A.

Check local privacy laws before putting surveillance in place.

B.

Ensure surveillance is discreet so employees do not alter their behavior.

C.

Once surveillance data has been gathered, limit exposure of the content.

D.

Ensure the minimal amount of surveillance is performed to meet the objective.

Question 54

A key principle of an effective privacy policy is that it should be?

Options:

A.

Written in enough detail to cover the majority of likely scenarios.

B.

Made general enough to maximize flexibility in its application.

C.

Presented with external parties as the intended audience.

D.

Designed primarily by the organization's lawyers.

Question 55

Which of the following does NOT illustrate the ‘respect to user privacy’ principle?

Options:

A.

Implementing privacy elements within the user interface that facilitate the use of technology by any visually-challenged users.

B.

Enabling Data Subject Access Request (DSARs) that provide rights for correction, deletion, amendment and rectification of personal information.

C.

Developing a consent management self-service portal that enables the data subjects to review the details of consent provided to an organization.

D.

Filing breach notification paperwork with data protection authorities which detail the impact to data subjects.

Question 56

Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?

Options:

A.

A group of hackers infiltrate a power grid and cause a major blackout.

B.

An insurance company raises a person’s rates based on driving habits gathered from a connected car.

C.

A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits.

D.

A water district fines an individual after a meter reading reveals excess water use during drought conditions.

Question 57

Which activity would best support the principle of data quality?

Options:

A.

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.

Ensuring that the number of teams processing personal information is limited.

C.

Delivering information in a format that the data subject understands.

D.

Ensuring that information remains accurate.

Question 58

Which concept related to privacy choice is demonstrated by highlighting and bolding the "accept" button on a cookies notice while maintaining standard text format for other options?

Options:

A.

Illuminating

B.

Nudging

C.

Suppression

D.

Tagging

Question 59

Which is NOT a suitable action to apply to data when the retention period ends?

Options:

A.

Aggregation.

B.

De-identification.

C.

Deletion.

D.

Retagging.

Question 60

Which of the following best describes the basic concept of "Privacy by Design?"

Options:

A.

The adoption of privacy enhancing technologies.

B.

The integration of a privacy program with all lines of business.

C.

The implementation of privacy protection through system architecture.

D.

The introduction of business process to identify and assess privacy gaps.

Question 61

An organization is launching a smart watch which, in addition to alerts, will notify the the wearer of incoming calls allowing them to answer on the device. This convenience also comes with privacy concerns and is an example of?

Options:

A.

Value-Sensitive Design.

B.

Ubiquitous computing.

C.

Anthropomorphism.

D.

Coupling

Question 62

Which privacy engineering objective proposed by the US National Institute of Science and Technology (NIST) decreases privacy risk by ensuring that connections between individuals and their personal data are reduced?

Options:

A.

Disassoc lability

B.

Manageability

C.

Minimization

D.

Predictability

Question 63

A clinical research organization is processing highly sensitive personal data, including numerical attributes, from medical trial results. The organization needs to manipulate the data without revealing the contents to data users. This can be achieved by utilizing?

Options:

A.

k-anonymity.

B.

Microdata sets.

C.

Polymorphic encryption.

D.

Homomorphic encryption.

Question 64

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?

Options:

A.

Cloud file transfer services.

B.

Certificate Authority (CA).

C.

HyperText Transfer Protocol (HTTP).

D.

Transport Layer Security (TLS).

Question 65

An organization is reliant on temporary contractors for performing data analytics and they require access to personal data via software-as-a-service to perform their job. When the temporary contractor completes their work assignment, what woul^.be the most effective way to safeguard privacy and access to personal data when they leave?

Options:

A.

Set a system-based expiry that requires management reauthorization for online access for accounts that have been active more than 6 months.

B.

Establish a predetermined automatic account expiration date based on contract timescales.

C.

Require temporary contractors to sign a non-disclosure agreement, security acceptable use policy, and online access authorizations by hiring managers.

D.

Mandate hiring managers to email IT or Security team when the contractor leaves.

Question 66

Which technique is most likely to facilitate the deletion of every instance of data associated with a deleted user account from every data store held by an organization?

Options:

A.

Auditing the code which deletes user accounts.

B.

Building a standardized and documented retention program for user data deletion.

C.

Monitoring each data store for presence of data associated with the deleted user account.

D.

Training engineering teams on the importance of deleting user accounts their associated data from all data stores when requested.

Page: 1 / 22
Total 220 questions