ExamGecko
Home Home / IAPP / CIPP-A

IAPP CIPP-A Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions




SCENARIO – Please use the following to answer the next question: Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data. Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge. Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed. Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories. HackProof reports to Zoe that a copy of the entire guest database has been exfiltrated by a hacker. What is Zoe's best course of action?



SCENARIO – Please use the following to answer the next question: Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data. Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge. Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed. Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories. Members of Relax Ltd's staff are concerned about the data sharing with StarOne. How should Zoe respond to their concerns?




SCENARIO – Please use the following to answer the next question:

Zoe is the new Compliance Manager for the Star Hotel Group, which has five hotels across Hong Kong and China. On her first day, she does an inspection of the largest property, StarOne. She starts with the hotel reception desk. Zoe sees the front desk assistant logging in to a database as he is checking in a guest. The hotel manager, Bernard, tells her that all guest data, including passport numbers, credit card numbers, home address, mobile number and other information associated with a guest's stay is held in a database. Bernard tells her not to worry about the security of the database because it is operated for Star Hotels by a local service provider called HackProof, who therefore are responsible for all the guest data.

Zoe notices what looks like a CCTV camera in the corner of the reception area. Bernard says they record all activity in the lobby. In fact, last Tuesday he had received a data access request from a lawyer requesting a copy of footage of all lobby activity for the preceding month. The lawyer's covering letter said that his client has never visited the hotel herself, but is investigating whether her husband has been doing so without her knowledge.

Zoe and Bernard head up to the hotel spa. The spa is independently owned by a company called Relax Ltd. Bernard explains that Relax Ltd is a small company and, as they don't have their own database, they transfer data about the spa guests to StarOne staff so that they can upload the data into the HackProof system. Relax Ltd staff can then login and review their guest data as needed.

Zoe asks more about the HackProof system. Bernard tells her that the server for the Hong Kong hotels is in Hong Kong, but there is a server in Shenzhen that has a copy of all the Hong Kong hotel data and supports the properties in China. The data is in China for back up purposes and also is accessible by staff in the China hotels so they can better service guests who visit their hotels in both territories.

HackProof reports to Zoe that a copy of the entire guest database has been exfiltrated by a hacker.

What is Zoe's best course of action?

A.

Zoe must immediately notify all guests, the police and the Privacy Commissioner of the breach.

A.

Zoe must immediately notify all guests, the police and the Privacy Commissioner of the breach.

Answers
B.

Zoe does not need to do anything as there is no mandatory breach notification requirement in Hong Kong.

B.

Zoe does not need to do anything as there is no mandatory breach notification requirement in Hong Kong.

Answers
C.

Zoe must report the breach to the Privacy Commissioner and make an action plan together with the Commissioner.

C.

Zoe must report the breach to the Privacy Commissioner and make an action plan together with the Commissioner.

Answers
D.

Zoe should consider if there is a real risk of harm to the guests and take appropriate action based on her assessment.

D.

Zoe should consider if there is a real risk of harm to the guests and take appropriate action based on her assessment.

Answers
Suggested answer: D

In 2015, Section 66A of India's IT Act was ruled unconstitutional.

What did this section previously prohibit?

A.

Publishing images with sexually explicit content.

A.

Publishing images with sexually explicit content.

Answers
B.

Tampering with computer source documents.

B.

Tampering with computer source documents.

Answers
C.

Publishing private images of others.

C.

Publishing private images of others.

Answers
D.

Sending offensive messages.

D.

Sending offensive messages.

Answers
Suggested answer: D

Explanation:

Reference: https://www.legallyindia.com/views/entry/section-66a-its-repeal-and-its-after-effects

In the area of human rights, what separates Singapore from many other Asian countries?

A.

It is not a member of the Association of Southeast Asian Nations (ASEAN).

A.

It is not a member of the Association of Southeast Asian Nations (ASEAN).

Answers
B.

It has not signed the International Covenant on Civil and Political Rights.

B.

It has not signed the International Covenant on Civil and Political Rights.

Answers
C.

It has not adopted the ASEAN Human Rights Declaration.

C.

It has not adopted the ASEAN Human Rights Declaration.

Answers
D.

It is not a member of the United Nations.

D.

It is not a member of the United Nations.

Answers
Suggested answer: B

Explanation:

Reference: https://www.fidh.org/en/region/asia/singapore/government-s-response-to-un-review-a-major-setback-for-humanrights

SCENARIO – Please use the following to answer the next question:

Dracarys Inc. is a large multinational company with headquarters in Seattle, Washington, U.S.A. Dracarys began as a small company making and selling women's clothing, but rapidly grew through its early innovative use of online platforms to sell its products. Dracarys is now one of the biggest names in the industry, and employs staff across the globe, and in Asia has employees located in both Singapore and Hong Kong.

Due to recent management restructuring they have decided, on the advice of external consultants, to open an office in India in order to centralize its call center as well as its internal human resource functions for the Asia region.

Dracarys would like to centralize the following human resource functions in India:

A.

The recruitment process;

A.

The recruitment process;

Answers
B.

Employee assessment and records management;

B.

Employee assessment and records management;

Answers
C.

Employee benefits administration, including health insurance.

Dracarys will have employees on the ground in India managing the systems for the functions listed above. They have been presented with a variety of vendor options for these systems, and are currently assessing the suitability of these vendors for their needs.

The CEO of Dracarys is concerned about the behavior of her employees, especially online. After having proprietary company information being shared with competitors by former employees, she is eager to put certain measures in place to ensure that the activities of her employees, while on Dracarys' premises or when using any of Dracarys' computers and networks are not detrimental to the business.

Dracarys' external consultants are also advising the company on how to increase earnings. Dracary's management refuses to reduce production costs and compromise the quality of their garments, so the consultants suggested utilizing customer data to create targeted advertising and thus increase sales.

Dracary's existing client data sets have been anonymised but the CEO is concerned about re-identification and the risks of using the data for further analysis.

What should the CEO do?

C.

Employee benefits administration, including health insurance.

Dracarys will have employees on the ground in India managing the systems for the functions listed above. They have been presented with a variety of vendor options for these systems, and are currently assessing the suitability of these vendors for their needs.

The CEO of Dracarys is concerned about the behavior of her employees, especially online. After having proprietary company information being shared with competitors by former employees, she is eager to put certain measures in place to ensure that the activities of her employees, while on Dracarys' premises or when using any of Dracarys' computers and networks are not detrimental to the business.

Dracarys' external consultants are also advising the company on how to increase earnings. Dracary's management refuses to reduce production costs and compromise the quality of their garments, so the consultants suggested utilizing customer data to create targeted advertising and thus increase sales.

Dracary's existing client data sets have been anonymised but the CEO is concerned about re-identification and the risks of using the data for further analysis.

What should the CEO do?

Answers
D.

Assess the business risk of further processing in the absence of any regulations on anonymised data.

D.

Assess the business risk of further processing in the absence of any regulations on anonymised data.

Answers
E.

Refer to India's Information Technology Act and the 2011 rules 3-8 for guidance on handling anonymised data.

E.

Refer to India's Information Technology Act and the 2011 rules 3-8 for guidance on handling anonymised data.

Answers
F.

Obtain the consent of the data subjects because anonymous data must be treated as personal data at all times.

F.

Obtain the consent of the data subjects because anonymous data must be treated as personal data at all times.

Answers
G.

Adhere to the Singapore guidelines on anonymization and the Hong Kong Guidance on Personal Data Erasure and Anonymization.

G.

Adhere to the Singapore guidelines on anonymization and the Hong Kong Guidance on Personal Data Erasure and Anonymization.

Answers
Suggested answer: A

SCENARIO – Please use the following to answer the next question:

B-Star Limited is a Singapore based construction company with many foreign construction workers. B-Star's HR team maintains two databases. One (the "simple database") contains basic details from a standard in-processing form such as name, local address and mobile number. The other database (the "sensitive database") contains information collected by the HR Department as part of Annual Review Interviews. With the workers' cooperation, this database has expanded to include far-reaching sensitive information such as medical history, religious beliefs, ethnicity and educational levels of immediate family members. Carl left B-Star's employment yesterday, and has flown back home, rendering him unreachable. Today BStar, without Carl's consent, wants to conduct research using Carl's medical records in the sensitive database.

Can B-Star legally conduct this research using Carl's medical data?

A.

Yes, because Carl gave his consent for his sensitive personal data to be collected during his employment.

A.

Yes, because Carl gave his consent for his sensitive personal data to be collected during his employment.

Answers
B.

No, an organization is not allowed to use sensitive personal data without an individual's consent unless absolutely necessary.

B.

No, an organization is not allowed to use sensitive personal data without an individual's consent unless absolutely necessary.

Answers
C.

No, because the research is taking place after Carl has left B-Star's employment.

C.

No, because the research is taking place after Carl has left B-Star's employment.

Answers
D.

Yes, if the research is deemed to be in the public interest.

D.

Yes, if the research is deemed to be in the public interest.

Answers
Suggested answer: B

In June 2011, the Hong Kong Privacy Commissioner determined that data subject consent is NOT valid if it is what?

A.

Provided by the data subject solely in verbal form.

A.

Provided by the data subject solely in verbal form.

Answers
B.

Used for a directly related but separate purpose.

B.

Used for a directly related but separate purpose.

Answers
C.

Bundled with other terms of the agreement.

C.

Bundled with other terms of the agreement.

Answers
D.

Intended for direct marketing purposes.

D.

Intended for direct marketing purposes.

Answers
Suggested answer: C

Explanation:

Reference: https://thelawreviews.co.uk/title/the-privacy-data-protection-and-cybersecurity-law-review/hong-kong

On what group does Singapore's PDPA impose disclosure restrictions that Hong Kong and India do not?

A.

Government officials.

A.

Government officials.

Answers
B.

Children under 13.

B.

Children under 13.

Answers
C.

The deceased.

C.

The deceased.

Answers
D.

The clergy.

D.

The clergy.

Answers
Suggested answer: A

Which control is NOT included in the requirements established by the Monetary Authority of Singapore (MAS) for financial institutions in order to deter money-laundering and financial aid to terrorism (AML/ CFT)?

A.

Identifying and knowing customers.

A.

Identifying and knowing customers.

Answers
B.

Sharing personal information with the PDPC.

B.

Sharing personal information with the PDPC.

Answers
C.

Conducting regular reviews of customer accounts.

C.

Conducting regular reviews of customer accounts.

Answers
D.

Monitoring and reporting suspicious financial transactions.

D.

Monitoring and reporting suspicious financial transactions.

Answers
Suggested answer: A

Explanation:

Reference: https://www.mas.gov.sg/-/media/MAS/Regulations-and-Financial-Stability/Regulatory-and-Supervisory-Framework/Anti_Money-Laundering_Countering-the-Financing-of-Terrorism/Guidance-for-Effective-AML-CFT-

Transaction-Monitoring-Controls.pdf (page 3)

Cases in which an Indian company is accused of violating provisions of India's IT Act must be heard by?

A.

The High Court.

A.

The High Court.

Answers
B.

A Grievance Officer.

B.

A Grievance Officer.

Answers
C.

An Adjudicating Officer.

C.

An Adjudicating Officer.

Answers
D.

The Cyber Appellate Tribunal.

D.

The Cyber Appellate Tribunal.

Answers
Suggested answer: A

Explanation:

Reference: https://en.wikipedia.org/wiki/Information_Technology_Act,_2000

Which of the following principles of the OECD guidelines and Council of European Convention principles does Singapore's PDPA incorporate?

A.

Disclosures to third parties included in access requests.

A.

Disclosures to third parties included in access requests.

Answers
B.

Additional protections for sensitive personal data.

B.

Additional protections for sensitive personal data.

Answers
C.

The ability to opt-out from direct marketing.

C.

The ability to opt-out from direct marketing.

Answers
D.

The right of deletion of data on request.

D.

The right of deletion of data on request.

Answers
Suggested answer: C

Explanation:

Reference: https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=3204&context=sol_research

Total 93 questions
Go to page: of 10