IAPP CIPT Practice Test - Questions Answers, Page 21
List of questions
Related questions
Many modern vehicles incorporate technologies that increase the convenience of drivers, but collect information about driver behavior in order to Implement this. What should vehicle manufacturers prioritize to ensure enhanced privacy protection for drivers?
Share the sensitive data collected about driver behavior with the driver.
Derive implicit consent for the processing of sensitive data by the continued use of the vehicle.
Obtain affirmative consent for processing of sensitive data about the driver.
Provide easy to read, in-vehicle instructions about how to use the technology.
An organization is launching a smart watch which, in addition to alerts, will notify the the wearer of incoming calls allowing them to answer on the device. This convenience also comes with privacy concerns and is an example of?
Value-Sensitive Design.
Ubiquitous computing.
Anthropomorphism.
Coupling
What is the main issue pertaining to data protection with the use of 'deep fakes'?
Misinformation.
Non-conformity with the accuracy principle.
Issues with establishing non-repudiation.
Issues with confidentiality of the information.
An organization is considering launching enhancements to improve security and authentication mechanisms in their products. To better identify the user and reduce friction from the authentication process, they plan to track physical attributes of an individual. A privacy technologist assessing privacy implications would be most interested in which of the following?
The purpose of the data tracking.
That the individual is aware tracking is occurring.
The authentication mechanism proposed.
The encryption of individual physical attributes.
Which of the following best describes the basic concept of "Privacy by Design?"
The adoption of privacy enhancing technologies.
The integration of a privacy program with all lines of business.
The implementation of privacy protection through system architecture.
The introduction of business process to identify and assess privacy gaps.
Which of the following methods does NOT contribute to keeping the data confidential?
Differential privacy.
Homomorphic encryption.
K-anonymity.
Referential integrity.
What element is most conducive to fostering a sound privacy by design culture in an organization?
Ensuring all employees acknowledge and understood the privacy policy.
Frequent privacy and security awareness training for employees.
Monthly reviews of organizational privacy principles.
Gaining advocacy from senior management.
After stringent testing an organization has launched a new web-facing ordering system for its consumer medical products. As the medical products could provide indicators of health conditions, the organization could further strengthen its privacy controls by deploying?
Run time behavior monitoring.
A content delivery network.
Context aware computing.
Differential identifiability.
Machine-learning based solutions present a privacy risk because?
Training data used during the training phase is compromised.
The solution may contain inherent bias from the developers.
The decision-making process used by the solution is not documented.
Machine-learning solutions introduce more vulnerabilities than other software.
An organization is launching a new smart speaker to the market. The device will have the capability to play music and provide news and weather updates. Which of the following would be a concern from a privacy perspective?
Appropriation.
Browser Fingerprinting.
Context of authority.
Context aware computing.
Question