IAPP CIPT Practice Test - Questions Answers, Page 16
List of questions
Related questions
Which of the following would be an example of an "objective" privacy harm to an individual?
Receiving spam following the sale an of email address.
Negative feelings derived from government surveillance.
Social media profile views indicating unexpected interest in a person.
Inaccuracies in personal data.
Value sensitive design focuses on which of the following?
Quality and benefit.
Ethics and morality.
Confidentiality and integrity.
Consent and human rights.
Which of the following is most important to provide to the data subject before the collection phase of the data lifecycle?
Privacy Notice.
Disclosure Policy.
Consent Request.
Data Protection Policy.
Which of the following is a stage in the data life cycle?
Data classification.
Data inventory.
Data masking.
Data retention.
An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?
Transfer the data to another location.
Invoke the appropriate deletion clause in the cloud terms and conditions.
Obtain a destruction certificate from the cloud vendor.
Destroy all encryption keys associated with the data.
A BaaS provider backs up the corporate data and stores it in an outsider provider under contract with the organization. A researcher notifies the organization that he found unsecured data in the cloud.
The organization looked into the issue and realized $ne of its backups was misconfigured on the outside provider's cloud and the data fully exposed to the open internet. They quickly secured the backup. Which is the best next step the organization should take?
Review the content of the data exposed.
Review its contract with the outside provider.
Investigate how the researcher discovered the unsecured data.
Investigate using alternate BaaS providers or on-premise backup systems.
When writing security policies, the most important consideration is to?
Require all employees to read and acknowledge their understanding.
Ensure they are based on the organization's risk profile.
Ensure they cover enough details for common situations.
Follow industry best practices.
In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?
The size of the data.
The format of the data.
The range of the data.
The medium of the data.
Which activity should the privacy technologist undertake to reduce potential privacy risk when evaluating options to process data in a country other than where it would be collected?
^
Review the Data Life Cycle.
Review data retention policies.
Create enterprise data flow diagrams.
Recommend controls for data transfers.
Information classification helps an organization protect confidential and nonpublic information primarily because?
It helps identify sensitive and critical information that require very strict safeguards.
It falls under the security principles of confidentiality, integrity, and availability.
It promotes employee accountability for safeguarding confidential information.
It is legally required under most regulations.
Question