IAPP CIPT Practice Test - Questions Answers, Page 20
List of questions
Related questions
Which privacy engineering objective proposed by the US National Institute of Science and Technology (NIST) decreases privacy risk by ensuring that connections between individuals and their personal data are reduced?
Disassoc lability
Manageability
Minimization
Predictability
What is the main privacy threat posed by Radio Frequency Identification (RFID)?
RFID can be utilized to track people or consumer products
RFID can be utilized to gam unauthorized access to an individual's device
RFID can be utilized to spoof identification details
RFID can be utilized to read information from a device without the user's knowledge
A jurisdiction requiring an organization to place a link on the website that allows a consumer to optout of sharing is an example of what type of requirement?
Functional
Operational
Technical
Use case
An organization is using new technologies that will target and process personal data of EU customers.
In which of the following circumstances would a privacy technologist need to support a data protection impact assessment (DPIA)?
If a privacy notice and opt-m consent box are not displayed to the individual
If security of data processing has not been evaluated
If a large amount of personal data will be collected.
If data processing is a high risk to an individual's rights and freedoms
Which of the following activities would be considered the best method for an organization to achieve the privacy principle of data quality'?
Clash customer information with information from a data broker
Build a system with user access controls and approval workflows to edit customer data
Set a privacy notice covering the purpose for collection of a customer's data
Provide a customer with a copy of their data in a machine-readable format
A developer is designing a new system that allows an organization's helpdesk to remotely connect into the device of the individual to provide support Which of the following will be a privacy technologist's primary concern"?
Geofencing
Geo-tracking
Geo-tagging
Geolocation
What risk is mitigated when routing meeting video traffic through a company's application servers rather than sending the video traffic directly from one user to another?
The user's identity is protected from the other user
The user is protected against cyberstalking attacks
The user's IP address is hidden from the other user
The user is assured that stronger authentication methods have been used
An organization is evaluating a number of Machine Learning (ML) solutions to help automate a customer-facing part of its business From a privacy perspective, the organization should first?
Define their goals for fairness
Document the distribution of bias scores
Document the False Positive Rates (FPR).
Define how data subjects may object to the processing
How does browser fingerprinting compromise privacy?
By creating a security vulnerability.
By differentiating users based upon parameters.
By persuading users to provide personal information.
By customizing advertising based on the geographic location.
A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?
Explicit.
Implicit.
Specific
Valid.
Question