Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > IAPP > Information Privacy Technologist > CIPT

CIPT Certified Information Privacy Technologist (CIPT) Question and Answers

Question # 4

What element is most conducive to fostering a sound privacy by design culture in an organization?

A.

Ensuring all employees acknowledge and understood the privacy policy.

B.

Frequent privacy and security awareness training for employees.

C.

Monthly reviews of organizational privacy principles.

D.

Gaining advocacy from senior management.

Full Access
Question # 5

What is the potential advantage of homomorphic encryption?

A.

Encrypted information can be analyzed without decrypting it first.

B.

Ciphertext size decreases as the security level increases.

C.

It allows greater security and faster processing times.

D.

It makes data impenetrable to attacks.

Full Access
Question # 6

What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?

A.

The ad being served to the user may not be relevant.

B.

The user’s sensitive personal information is used to display targeted ads.

C.

The personal information used to target ads can be discerned by the server.

D.

The user’s information can be leaked to an advertiser through weak de-identification techniques.

Full Access
Question # 7

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

A.

The Open ID Federation.

B.

PCI Data Security Standards Council

C.

International Organization for Standardization.

D.

Personal Information Protection and Electronic Documents Act.

Full Access
Question # 8

Not updating software for a system that processes human resources data with the latest security patches may create what?

A.

Authentication issues.

B.

Privacy vulnerabilities.

C.

Privacy threat vectors.

D.

Reportable privacy violations.

Full Access
Question # 9

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?

A.

Cloud file transfer services.

B.

Certificate Authority (CA).

C.

HyperText Transfer Protocol (HTTP).

D.

Transport Layer Security (TLS).

Full Access
Question # 10

During a transport layer security (TLS) session, what happens immediately after the web browser creates a random PreMasterSecret?

A.

The server decrypts the PremasterSecret.

B.

The web browser opens a TLS connection to the PremasterSecret.

C.

The web browser encrypts the PremasterSecret with the server's public key.

D.

The server and client use the same algorithm to convert the PremasterSecret into an encryption key.

Full Access
Question # 11

Which of the following techniques describes the use of encryption where encryption keys are divided into parts that can then be used to recover a full encryption key?

A.

Homomorphic encryption.

B.

Asymmetric cryptography.

C.

Cryptographic hashing.

D.

Secret sharing.

Full Access
Question # 12

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride" for automobile-related products or “Zoomer” for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

A.

Server driven controls.

B.

Cloud computing

C.

Data on demand

D.

MAC filtering

Full Access
Question # 13

SCENARIO

Please use the following to answer the next question:

Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.

Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.

After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.

How can Finley Motors reduce the risk associated with transferring Chuck’s personal information to AMP Payment Resources?

A.

By providing only the minimum necessary data to process the violation notice and masking all other information prior to transfer.

B.

By requesting AMP Payment Resources delete unnecessary datasets and only utilize what is necessary to process the violation notice.

C.

By obfuscating the minimum necessary data to process the violation notice and require AMP Payment Resources to secure store the personal information.

D.

By transferring all information to separate datafiles and requiring AMP Payment Resources to combine the datasets during processing of the violation notice.

Full Access
Question # 14

A BaaS provider backs up the corporate data and stores it in an outsider provider under contract with the organization. A researcher notifies the organization that he found unsecured data in the cloud. The organization looked into the issue and realized $ne of its backups was misconfigured on the outside provider's cloud and the data fully exposed to the open internet. They quickly secured the backup. Which is the best next step the organization should take?

A.

Review the content of the data exposed.

B.

Review its contract with the outside provider.

C.

Investigate how the researcher discovered the unsecured data.

D.

Investigate using alternate BaaS providers or on-premise backup systems.

Full Access
Question # 15

SCENARIO

It should be the most secure location housing data in all of Europe, if not the world. The Global Finance Data Collective (GFDC) stores financial information and other types of client data from large banks, insurance companies, multinational corporations and governmental agencies. After a long climb on a mountain road that leads only to the facility, you arrive at the security booth. Your credentials are checked and checked again by the guard to visually verify that you are the person pictured on your passport and national identification card. You are led down a long corridor with server rooms on each side, secured by combination locks built into the doors. You climb a flight of stairs and are led into an office that is lighted brilliantly by skylights where the GFDC Director of Security, Dr. Monique Batch, greets you. On the far wall you notice a bank of video screens showing different rooms in the facility. At the far end, several screens show different sections of the road up the mountain

Dr. Batch explains once again your mission. As a data security auditor and consultant, it is a dream assignment: The GFDC does not want simply adequate controls, but the best and most effective security that current technologies allow.

“We were hacked twice last year,” Dr. Batch says, “and although only a small number of records were stolen, the bad press impacted our business. Our clients count on us to provide security that is nothing short of impenetrable and to do so quietly. We hope to never make the news again.” She notes that it is also essential that the facility is in compliance with all relevant security regulations and standards.

You have been asked to verify compliance as well as to evaluate all current security controls and security measures, including data encryption methods, authentication controls and the safest methods for transferring data into and out of the facility. As you prepare to begin your analysis, you find yourself considering an intriguing question: Can these people be sure that I am who I say I am?

You are shown to the office made available to you and are provided with system login information, including the name of the wireless network and a wireless key. Still pondering, you attempt to pull up the facility's wireless network, but no networks appear in the wireless list. When you search for the wireless network by name, however it is readily found.

What type of wireless network does GFDC seem to employ?

A.

A hidden network.

B.

A reluctant network.

C.

A user verified network.

D.

A wireless mesh network.

Full Access
Question # 16

In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?

A.

The size of the data.

B.

The format of the data.

C.

The range of the data.

D.

The medium of the data.

Full Access
Question # 17

What is the main benefit of using a private cloud?

A.

The ability to use a backup system for personal files.

B.

The ability to outsource data support to a third party.

C.

The ability to restrict data access to employees and contractors.

D.

The ability to cut costs for storing, maintaining, and accessing data.

Full Access
Question # 18

A privacy engineer reviews a newly developed on-line registration page on a company’s website. The purpose of the page is to enable corporate customers to submit a returns / refund request for physical goods. The page displays the following data capture fields: company name, account reference, company address, contact name, email address, contact phone number, product name, quantity, issue description and company bank account details.

After her review, the privacy engineer recommends setting certain capture fields as “non-mandatory”. Setting which of the following fields as “non-mandatory” would be the best example of the principle of data minimization?

A.

The contact phone number field.

B.

The company address and name.

C.

The contact name and email address.

D.

The company bank account detail field.

Full Access
Question # 19

Which of the following does NOT illustrate the ‘respect to user privacy’ principle?

A.

Implementing privacy elements within the user interface that facilitate the use of technology by any visually-challenged users.

B.

Enabling Data Subject Access Request (DSARs) that provide rights for correction, deletion, amendment and rectification of personal information.

C.

Developing a consent management self-service portal that enables the data subjects to review the details of consent provided to an organization.

D.

Filing breach notification paperwork with data protection authorities which detail the impact to data subjects.

Full Access
Question # 20

Which of the following would be an example of an "objective" privacy harm to an individual?

A.

Receiving spam following the sale an of email address.

B.

Negative feelings derived from government surveillance.

C.

Social media profile views indicating unexpected interest in a person.

D.

Inaccuracies in personal data.

Full Access
Question # 21

What must be done to destroy data stored on "write once read many" (WORM) media?

A.

The data must be made inaccessible by encryption.

B.

The erase function must be used to remove all data.

C.

The media must be physically destroyed.

D.

The media must be reformatted.

Full Access
Question # 22

it Is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

A.

Breaches of an individual's data.

B.

Illicit collection of personal data.

C.

Manipulation of a user's choice.

D.

Discrimination from profiling.

Full Access
Question # 23

What is the best way to protect privacy on a geographic information system (GIS)?

A.

Limiting the data provided to the system.

B.

Using a wireless encryption protocol.

C.

Scrambling location information.

D.

Using a firewall.

Full Access
Question # 24

Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

A.

Verifying the accuracy of the data by contacting users.

B.

Validating the company’s data collection procedures.

C.

Introducing erroneous data to see if its detected.

D.

Tracking changes to data through auditing.

Full Access
Question # 25

In order to prevent others from identifying an individual within a data set, privacy engineers use a cryptographically-secure hashing algorithm. Use of hashes in this way illustrates the privacy tactic known as what?

A.

Isolation.

B.

Obfuscation.

C.

Perturbation.

D.

Stripping.

Full Access
Question # 26

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

• "I consent to receive notifications and infection alerts";

• "I consent to receive information on additional features or services, and new products";

• "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

• "I consent to share my data for medical research purposes"; and

• "I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening

service works as follows:

• Step 1 A photo of the user's face is taken.

• Step 2 The user measures their temperature and adds the reading in the app

• Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

• Step 4 The user is asked to answer questions on known symptoms

• Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user’s risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium’ or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

A.

Relationship of family member

B.

Phone number

C.

Dale of birth

D.

Citizenship

Full Access
Question # 27

Which of the following CANNOT be effectively determined during a code audit?

A.

Whether access control logic is recommended in all cases.

B.

Whether data is being incorrectly shared with a third-party.

C.

Whether consent is durably recorded in the case of a server crash.

D.

Whether the differential privacy implementation correctly anonymizes data.

Full Access
Question # 28

A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?

A.

Explicit.

B.

Implicit.

C.

Specific

D.

Valid.

Full Access
Question # 29

Which of the following is the best method to minimize tracking through the use of cookies?

A.

Use ‘private browsing’ mode and delete checked files, clear cookies and cache once a day.

B.

Install a commercially available third-party application on top of the browser that is already installed.

C.

Install and use a web browser that is advertised as ‘built specifically to safeguard user privacy’.

D.

Manage settings in the browser to limit the use of cookies and remove them once the session completes.

Full Access
Question # 30

Which of the following is a vulnerability of a sensitive biometrics authentication system?

A.

False positives.

B.

False negatives.

C.

Slow recognition speeds.

D.

Theft of finely individualized personal data.

Full Access
Question # 31

An organization is launching a new smart speaker to the market. The device will have the capability to play music and provide news and weather updates. Which of the following would be a concern from a privacy perspective?

A.

Appropriation.

B.

Browser Fingerprinting.

C.

Context of authority.

D.

Context aware computing.

Full Access
Question # 32

A company configures their information system to have the following capabilities:

Allow for selective disclosure of attributes to certain parties, but not to others.

Permit the sharing of attribute references instead of attribute values - such as “I am over 21” instead of birthday date.

Allow for information to be altered or deleted as needed.

These capabilities help to achieve which privacy engineering objective?

A.

Predictability.

B.

Manageability.

C.

Disassociability.

D.

Integrity.

Full Access