ExamGecko
Home Home / IAPP / CIPT

IAPP CIPT Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions




SCENARIO Please use the following to answer the next questions: Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed: • "I consent to receive notifications and infection alerts"; • "I consent to receive information on additional features or services, and new products"; • "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes"; • "I consent to share my data for medical research purposes"; and • "I consent to share my data with healthcare providers affiliated to the company". For each choice, an ON* or OFF tab is available The default setting is ON for all Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening service works as follows: • Step 1 A photo of the user's face is taken. • Step 2 The user measures their temperature and adds the reading in the app • Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms • Step 4 The user is asked to answer questions on known symptoms • Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).) The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider. A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium' or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?







In day to day interactions with technology, consumers are presented with privacy choices. Which of the following best represents the Privacy by Design (PbD) methodology of letting the user choose a non-zero-sum choice?

A.

Using images, words, and contexts to elicit positive feelings that result in proactive behavior, thus eliminating negativity and biases.

A.

Using images, words, and contexts to elicit positive feelings that result in proactive behavior, thus eliminating negativity and biases.

Answers
B.

Providing plain-language design choices that elicit privacy-related responses, helping users avoid errors and minimize the negative consequences of errors when they do occur.

B.

Providing plain-language design choices that elicit privacy-related responses, helping users avoid errors and minimize the negative consequences of errors when they do occur.

Answers
C.

Displaying the percentage of users that chose a particular option, thus enabling the user to choose the most preferred option.

C.

Displaying the percentage of users that chose a particular option, thus enabling the user to choose the most preferred option.

Answers
D.

Using contexts, antecedent events, and other priming concepts to assist the user in making a better privacy choice.

D.

Using contexts, antecedent events, and other priming concepts to assist the user in making a better privacy choice.

Answers
Suggested answer: B

What risk is mitigated when routing video traffic through a company's application servers, rather than sending the video traffic directly from one user to another?

A.

The user is protected against phishing attacks.

A.

The user is protected against phishing attacks.

Answers
B.

The user's identity is protected from the other user.

B.

The user's identity is protected from the other user.

Answers
C.

The user's approximate physical location is hidden from the other user.

C.

The user's approximate physical location is hidden from the other user.

Answers
D.

The user is assured that stronger authentication methods have been used.

D.

The user is assured that stronger authentication methods have been used.

Answers
Suggested answer: B

Organizations understand there are aggregation risks associated with the way the process their customer's dat a. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.

What type of risk response does this notice and consent represent?

A.

Risk transfer.

A.

Risk transfer.

Answers
B.

Risk mitigation.

B.

Risk mitigation.

Answers
C.

Risk avoidance.

C.

Risk avoidance.

Answers
D.

Risk acceptance.

D.

Risk acceptance.

Answers
Suggested answer: A

Which is likely to reduce the types of access controls needed within an organization?

A.

Decentralization of data.

A.

Decentralization of data.

Answers
B.

Regular data inventories.

B.

Regular data inventories.

Answers
C.

Standardization of technology.

C.

Standardization of technology.

Answers
D.

Increased number of remote employees.

D.

Increased number of remote employees.

Answers
Suggested answer: C

What is an Access Control List?

A.

A list of steps necessary for an individual to access a resource.

A.

A list of steps necessary for an individual to access a resource.

Answers
B.

A list that indicates the type of permission granted to each individual.

B.

A list that indicates the type of permission granted to each individual.

Answers
C.

A list showing the resources that an individual has permission to access.

C.

A list showing the resources that an individual has permission to access.

Answers
D.

A list of individuals who have had their access privileges to a resource revoked.

D.

A list of individuals who have had their access privileges to a resource revoked.

Answers
Suggested answer: C

Which of the following is an example of drone "swarming"?

A.

A drone filming a cyclist from above as he rides.

A.

A drone filming a cyclist from above as he rides.

Answers
B.

A drone flying over a building site to gather data.

B.

A drone flying over a building site to gather data.

Answers
C.

Drones delivering retailers' packages to private homes.

C.

Drones delivering retailers' packages to private homes.

Answers
D.

Drones communicating with each other to perform a search and rescue.

D.

Drones communicating with each other to perform a search and rescue.

Answers
Suggested answer: D

An individual drives to the grocery store for dinner. When she arrives at the store, she receives several unsolicited notifications on her phone about discounts on items at the grocery store she is about to shop at. Which type of privacy problem does the represent?

A.

Intrusion.

A.

Intrusion.

Answers
B.

Surveillance.

B.

Surveillance.

Answers
C.

Decisional Interference.

C.

Decisional Interference.

Answers
D.

Exposure.

D.

Exposure.

Answers
Suggested answer: B

Explanation:

The individual receives unsolicited notifications on her phone about discounts on items at the grocery store she is about to shop at. This is an example of surveillance because the grocery store is tracking the individual's location and sending her unsolicited notifications.

What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?

A.

Implementing a mandatory privacy review and legal approval process.

A.

Implementing a mandatory privacy review and legal approval process.

Answers
B.

Obtain leadership buy-in for a mandatory privacy review and approval process.

B.

Obtain leadership buy-in for a mandatory privacy review and approval process.

Answers
C.

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.

C.

Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.

Answers
D.

Conduct annual Privacy by Design training and refreshers for all impacted personnel.

D.

Conduct annual Privacy by Design training and refreshers for all impacted personnel.

Answers
Suggested answer: B

Explanation:

This is the most effective first step to operationalize Privacy by Design principles in new product development and projects. It is important to obtain leadership buy-in for a mandatory privacy review and approval process to ensure that privacy is a priority throughout the organization.

Which of the following is NOT a step in the methodology of a privacy risk framework?

A.

Assessment.

A.

Assessment.

Answers
B.

Monitoring.

B.

Monitoring.

Answers
C.

Response.

C.

Response.

Answers
D.

Ranking.

D.

Ranking.

Answers
Suggested answer: B

Explanation:

The steps in the methodology of a privacy risk framework are Assessment, Response, and Ranking.

Monitoring is not a step in the methodology of a privacy risk framework.

Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?

A.

Express consent.

A.

Express consent.

Answers
B.

Implied consent.

B.

Implied consent.

Answers
C.

Informed notice.

C.

Informed notice.

Answers
D.

Authorized notice.

D.

Authorized notice.

Answers
Suggested answer: A

Explanation:

Express consent occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed.

https://niccs.cisa.gov/education-training/catalog/international-association-privacy-professionalsiapp/certified-1

Total 220 questions
Go to page: of 22