IAPP CIPT Practice Test - Questions Answers, Page 15
List of questions
Related questions
In day to day interactions with technology, consumers are presented with privacy choices. Which of the following best represents the Privacy by Design (PbD) methodology of letting the user choose a non-zero-sum choice?
Using images, words, and contexts to elicit positive feelings that result in proactive behavior, thus eliminating negativity and biases.
Providing plain-language design choices that elicit privacy-related responses, helping users avoid errors and minimize the negative consequences of errors when they do occur.
Displaying the percentage of users that chose a particular option, thus enabling the user to choose the most preferred option.
Using contexts, antecedent events, and other priming concepts to assist the user in making a better privacy choice.
What risk is mitigated when routing video traffic through a company's application servers, rather than sending the video traffic directly from one user to another?
The user is protected against phishing attacks.
The user's identity is protected from the other user.
The user's approximate physical location is hidden from the other user.
The user is assured that stronger authentication methods have been used.
Organizations understand there are aggregation risks associated with the way the process their customer's dat a. They typically include the details of this aggregation risk in a privacy notice and ask that all customers acknowledge they understand these risks and consent to the processing.
What type of risk response does this notice and consent represent?
Risk transfer.
Risk mitigation.
Risk avoidance.
Risk acceptance.
Which is likely to reduce the types of access controls needed within an organization?
Decentralization of data.
Regular data inventories.
Standardization of technology.
Increased number of remote employees.
What is an Access Control List?
A list of steps necessary for an individual to access a resource.
A list that indicates the type of permission granted to each individual.
A list showing the resources that an individual has permission to access.
A list of individuals who have had their access privileges to a resource revoked.
Which of the following is an example of drone "swarming"?
A drone filming a cyclist from above as he rides.
A drone flying over a building site to gather data.
Drones delivering retailers' packages to private homes.
Drones communicating with each other to perform a search and rescue.
An individual drives to the grocery store for dinner. When she arrives at the store, she receives several unsolicited notifications on her phone about discounts on items at the grocery store she is about to shop at. Which type of privacy problem does the represent?
Intrusion.
Surveillance.
Decisional Interference.
Exposure.
What is the most effective first step to take to operationalize Privacy by Design principles in new product development and projects?
Implementing a mandatory privacy review and legal approval process.
Obtain leadership buy-in for a mandatory privacy review and approval process.
Set up an online Privacy Impact Assessment tool to facilitate Privacy by Design compliance.
Conduct annual Privacy by Design training and refreshers for all impacted personnel.
Which of the following is NOT a step in the methodology of a privacy risk framework?
Assessment.
Monitoring.
Response.
Ranking.
Which of the following occurs when an individual takes a specific observable action to indicate and confirm that they give permission for their information to be processed?
Express consent.
Implied consent.
Informed notice.
Authorized notice.
Question