ExamGecko
Home Home / IAPP / CIPM

IAPP CIPM Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











While trying to e-mail her manager, an employee has e-mailed a list of all the company's customers, including their bank details, to an employee with the same name at a different company. Which of the following would be the first stage in the incident response plan under the General Data Protection Regulation (GDPR)?

A.

Notification to data subjects.

A.

Notification to data subjects.

Answers
B.

Containment of impact of breach.

B.

Containment of impact of breach.

Answers
C.

Remediation offers to data subjects.

C.

Remediation offers to data subjects.

Answers
D.

Notification to the Information Commissioner's Office (ICO).

D.

Notification to the Information Commissioner's Office (ICO).

Answers
Suggested answer: B

Explanation:

The first stage in the incident response plan under the General Data Protection Regulation (GDPR) for this scenario would be to contain the impact of the breach. This means taking immediate action to stop the unauthorized access or disclosure of personal data, and to prevent it from happening again in the future. This could involve revoking access to the data, notifying the employee who mistakenly sent the data, and implementing security measures to prevent similar breaches from occurring in the future.

https://gdpr-info.eu/art-33-gdpr/

https://gdpr-info.eu/art-34-gdpr/

Which of the following is NOT a type of privacy program metric?

A.

Business enablement metrics.

A.

Business enablement metrics.

Answers
B.

Data enhancement metrics.

B.

Data enhancement metrics.

Answers
C.

Value creation metrics.

C.

Value creation metrics.

Answers
D.

Commercial metrics.

D.

Commercial metrics.

Answers
Suggested answer: C

Explanation:

Types of privacy program metrics include business enablement metrics, data enhancement metrics, and commercial metrics. Business enablement metrics measure the effectiveness of the privacy program in enabling the business to function without compromising privacy. Data enhancement metrics measure the effectiveness of the privacy program in enhancing data protection, such as through data minimization, access controls, and data security. Commercial metrics measure the effectiveness of the privacy program in creating value, such as through the development of new products, services, and customer experiences.

Privacy program metrics are used to assess the effectiveness of a privacy program and measure its progress. These metrics can include business enablement metrics, data enhancement metrics, and commercial metrics. Value creation metrics, however, are not typically used as privacy program metrics.

Your company provides a SaaS tool for B2B services and does not interact with individual consumers. A client's current employee reaches out with a right to delete request. what is the most appropriate response?

A.

Forward the request to the contact on file for the client asking them how they would like you to proceed.

A.

Forward the request to the contact on file for the client asking them how they would like you to proceed.

Answers
B.

Redirect the individual back to their employer to understand their rights and how this might impact access to company tools.

B.

Redirect the individual back to their employer to understand their rights and how this might impact access to company tools.

Answers
C.

Process the request assuming that the individual understands the implications to their organization if their information is deleted.

C.

Process the request assuming that the individual understands the implications to their organization if their information is deleted.

Answers
D.

Explain you are unable to process the request because business contact information and associated data is not covered under privacy rights laws.

D.

Explain you are unable to process the request because business contact information and associated data is not covered under privacy rights laws.

Answers
Suggested answer: B

Explanation:

If your organization provides a SaaS tool for B2B services and does not interact with individual consumers, and a client's current employee reaches out with a right to delete request, the most appropriate response is to redirect the individual back to their employer to understand their rights and how this might impact access to company tools. This is because your organization is acting as a processor for the client, who is the controller of the employee's personal data. The controller is responsible for determining the purposes and means of processing personal data, as well as responding to data subject requests. The processor should only process personal data on behalf of and in accordance with the instructions of the controller.Therefore, you should not forward the request to the client, process the request without consulting the client, or deny the request based on business contact information being exempt from privacy rights laws1,2.Reference:CIPM - International Association of Privacy Professionals,Free CIPM Study Guide - International Association of Privacy Professionals

When a data breach incident has occurred. the first priority is to determine?

A.

Who caused the breach.

A.

Who caused the breach.

Answers
B.

How the breach occurred.

B.

How the breach occurred.

Answers
C.

How to contain the breach.

C.

How to contain the breach.

Answers
D.

When the breach occurred.

D.

When the breach occurred.

Answers
Suggested answer: C

Explanation:

When a data breach incident has occurred, the first priority is to determine how to contain the breach. Containment means stopping or minimizing the further loss or unauthorized disclosure of personal data, as well as preserving evidence for investigation and remediation. Containment may involve isolating affected systems, devices, or networks; changing access credentials; blocking malicious IP addresses; or notifying relevant parties such as law enforcement or security experts.After containing the breach, the next steps are to assess the impact and severity of the breach, notify the affected individuals and authorities if required, evaluate the causes and risks of the breach, and implement measures to prevent future breaches1,2.Reference:CIPM - International Association of Privacy Professionals,Free CIPM Study Guide - International Association of Privacy Professionals

Which of the following is NOT a main technical data control area?

A.

Obfuscation.

A.

Obfuscation.

Answers
B.

Tokenization.

B.

Tokenization.

Answers
C.

Access controls.

C.

Access controls.

Answers
D.

Data minimization.

D.

Data minimization.

Answers
Suggested answer: A

Explanation:

Obfuscation is not a main technical data control are a. Obfuscation means hiding or disguising data or information to make it less intelligible or accessible. Obfuscation can be used as a security measure or a privacy-enhancing technique, but it is not a specific type of data control. The main technical data control areas are tokenization, encryption, access controls, and data minimization. Tokenization means replacing sensitive data with non-sensitive substitutes called tokens that have no intrinsic value. Encryption means transforming data into an unreadable format that can only be decrypted with a key. Access controls mean restricting who can access or modify data based on their roles, permissions, or authentication methods.Data minimization means collecting, storing, and processing only the minimum amount of data necessary for a specific purpose1,2.Reference:CIPM - International Association of Privacy Professionals,Free CIPM Study Guide - International Association of Privacy Professionals

Integrating privacy requirements into functional areas across the organization happens at which stage of the privacy operational life cycle?

A.

Assessing data.

A.

Assessing data.

Answers
B.

Protecting personal data.

B.

Protecting personal data.

Answers
C.

Sustaining program performance.

C.

Sustaining program performance.

Answers
D.

Responding to requests and incidents.

D.

Responding to requests and incidents.

Answers
Suggested answer: B

Explanation:

Integrating privacy requirements into functional areas across the organization happens at the ''protect'' stage of the privacy operational life cycle. This stage involves implementing privacy policies, procedures, and controls to ensure that personal data is processed in a lawful, fair, and transparent manner. The other stages of the privacy operational life cycle are ''assess'', ''align'', ''respond'', and ''sustain''.Reference:CIPM Body of Knowledge, Domain III: Privacy Program Operational Life Cycle, Section B: Protect.

Under the General Data Protection Regulation (GDPR), what must be included in a written agreement between the controller and processor in relation to processing conducted on the controller's behalf?

A.

An obligation on the processor to report any personal data breach to the controller within 72 hours,

A.

An obligation on the processor to report any personal data breach to the controller within 72 hours,

Answers
B.

An obligation on both parties to report any serious personal data breach to the supervisory authority

B.

An obligation on both parties to report any serious personal data breach to the supervisory authority

Answers
C.

An obligation on both parties to agree to a termination of the agreement if the other party is responsible for a personal data breach.

C.

An obligation on both parties to agree to a termination of the agreement if the other party is responsible for a personal data breach.

Answers
D.

An obligation on the processor to assist the controller in complying with the controller's obligations to notify the supervisory authority about personal data breaches.

D.

An obligation on the processor to assist the controller in complying with the controller's obligations to notify the supervisory authority about personal data breaches.

Answers
Suggested answer: D

Explanation:

Under the GDPR, a written agreement between the controller and processor in relation to processing conducted on the controller's behalf must include an obligation on the processor to assist the controller in complying with the controller's obligations to notify the supervisory authority about personal data breaches. This is one of the requirements under Article 28(3)(f) of the GDPR, which specifies the minimum content of such an agreement. The other options are not required by the GDPR, although they may be agreed upon by the parties as additional terms.Reference:GDPR, Article 28(3)(f).

Under the GDPR. when the applicable lawful basis for the processing of personal data is a legal obligation with which the controller must comply. which right can the data subject exercise?

A.

Right to withdraw consent.

A.

Right to withdraw consent.

Answers
B.

Right to data portability.

B.

Right to data portability.

Answers
C.

Right to restriction.

C.

Right to restriction.

Answers
D.

Right to erasure.

D.

Right to erasure.

Answers
Suggested answer: C

Explanation:

Under the GDPR, when the applicable lawful basis for the processing of personal data is a legal obligation with which the controller must comply, the data subject can exercise the right to restriction. This means that the data subject can request the controller to limit the processing of their personal data in certain circumstances, such as when they contest the accuracy or lawfulness of the processing. The other rights are not applicable in this case, as they are either dependent on consent (right to withdraw consent and right to data portability) or subject to exceptions (right to erasure).Reference:GDPR, Articles 6(1), 18, 21(1).

Which of the following is a physical control that can limit privacy risk?

A.

Keypad or biometric access.

A.

Keypad or biometric access.

Answers
B.

user access reviews.

B.

user access reviews.

Answers
C.

Encryption.

C.

Encryption.

Answers
D.

Tokenization.

D.

Tokenization.

Answers
Suggested answer: A

Explanation:

A physical control that can limit privacy risk is keypad or biometric access. This is a type of access control that restricts who can enter or access a physical location or device where personal data is stored or processed. Keypad or biometric access requires a code or a biological feature (such as a fingerprint or a face scan) to authenticate the identity and authorization of the person seeking access. This can prevent unauthorized access, theft, loss, or damage of personal data by outsiders or insiders, .Reference:[CIPM - International Association of Privacy Professionals], [Free CIPM Study Guide - International Association of Privacy Professionals]

Under the General Data Protection Regulation (GDPR), what are the obligations of a processor that engages a sub-processor?

A.

The processor must give the controller prior written notice and perform a preliminary audit of the sub-processor.

A.

The processor must give the controller prior written notice and perform a preliminary audit of the sub-processor.

Answers
B.

The processor must Obtain the controllers specifiC written authorization and provide annual reports on the sub-processor'S performance.

B.

The processor must Obtain the controllers specifiC written authorization and provide annual reports on the sub-processor'S performance.

Answers
C.

The processor must receive a written agreement that the sub-processor will be fully liable to the controller for the performance of its obligations in relation to the personal data concerned.

C.

The processor must receive a written agreement that the sub-processor will be fully liable to the controller for the performance of its obligations in relation to the personal data concerned.

Answers
D.

The processor must obtain the consent of the controller and ensure the sub-processor complies with data processing obligations that are equivalent to those that apply to the processor.

D.

The processor must obtain the consent of the controller and ensure the sub-processor complies with data processing obligations that are equivalent to those that apply to the processor.

Answers
Suggested answer: D

Explanation:

Under the General Data Protection Regulation (GDPR), the obligations of a processor that engages a sub-processor are to obtain the consent of the controller and ensure the sub-processor complies with data processing obligations that are equivalent to those that apply to the processor. The GDPR defines a processor as a natural or legal person, public authority, agency, or other body that processes personal data on behalf of the controller. A sub-processor is a third party that is engaged by the processor to carry out specific processing activities on behalf of the controller. The GDPR requires that the processor does not engage another processor without prior specific or general written authorization of the controller. In the case of general written authorization, the processor must inform the controller of any intended changes concerning the addition or replacement of other processors, thereby giving the controller the opportunity to object to such changes. The processor must also ensure that the same data protection obligations as set out in the contract or other legal act between the controller and the processor are imposed on that other processor by way of a contract or other legal act under Union or Member State law, .Reference:[GDPR Article 28], [CIPM - International Association of Privacy Professionals]

Total 180 questions
Go to page: of 18