IAPP CIPT Practice Test - Questions Answers, Page 14

List of questions
Question 131

A company configures their information system to have the following capabilities:
Allow for selective disclosure of attributes to certain parties, but not to others.
Permit the sharing of attribute references instead of attribute values - such as "I am over 21" instead of birthday date.
Allow for information to be altered or deleted as needed.
These capabilities help to achieve which privacy engineering objective?
Question 132

Which of the following functionalities can meet some of the General Data Protection Regulation's (GDPR's) Data Portability requirements for a social networking app designed for users in the EU?
Question 133

Which of the following is the least effective privacy preserving practice in the Systems Development Life Cycle (SDLC)?
Question 134

Between November 30th and December 2nd, 2013, cybercriminals successfully infected the credit card payment systems and bypassed security controls of a United States-based retailer with malware that exfiltrated 40 million credit card numbers. Six months prior, the retailer had malware detection software installed to prevent against such an attack.
Which of the following would best explain why the retailer's consumer data was still exfiltrated?
Question 135

When analyzing user data, how is differential privacy applied?
Question 136

What privacy risk is NOT mitigated by the use of encrypted computation to target and serve online ads?
Question 137

A company seeking to hire engineers in Silicon Valley ran an ad campaign targeting women in a specific age range who live in the San Francisco Bay Area.
Which Calo objective privacy harm is likely to result from this campaign?
Question 138

Which of the following modes of interaction often target both people who personally know and are strangers to the attacker?
Question 139

What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?
Question 140

Which of the following would be the most appropriate solution for preventing privacy violations related to information exposure through an error message?
Question