ExamGecko
Home Home / IAPP / CIPT

IAPP CIPT Practice Test - Questions Answers, Page 22

Question list
Search
Search

Related questions





SCENARIO Please use the following to answer the next questions: Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed: • "I consent to receive notifications and infection alerts"; • "I consent to receive information on additional features or services, and new products"; • "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes"; • "I consent to share my data for medical research purposes"; and • "I consent to share my data with healthcare providers affiliated to the company". For each choice, an ON* or OFF tab is available The default setting is ON for all Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening service works as follows: • Step 1 A photo of the user's face is taken. • Step 2 The user measures their temperature and adds the reading in the app • Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms • Step 4 The user is asked to answer questions on known symptoms • Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).) The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider. A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium' or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?






All of the following topics should be included in a workplace surveillance policy EXCEPT?

A.

Who can be tracked and when.

A.

Who can be tracked and when.

Answers
B.

Who can access surveillance data.

B.

Who can access surveillance data.

Answers
C.

What areas can be placed under surveillance.

C.

What areas can be placed under surveillance.

Answers
D.

Who benefits from collecting surveillance data.

D.

Who benefits from collecting surveillance data.

Answers
Suggested answer: D

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

A.

Web beacon tracking.

A.

Web beacon tracking.

Answers
B.

Browser fingerprinting.

B.

Browser fingerprinting.

Answers
C.

Entity tagging.

C.

Entity tagging.

Answers
D.

Canvas fingerprinting.

D.

Canvas fingerprinting.

Answers
Suggested answer: B

of the following best describes a network threat model and Its uses?

A.

It Is used in software development to detect programming errors.

A.

It Is used in software development to detect programming errors.

Answers
B.

It is a risk-based model used to calculate the probabilities of risks identified during vulnerability tests.

B.

It is a risk-based model used to calculate the probabilities of risks identified during vulnerability tests.

Answers
C.

It helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.

C.

It helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.

Answers
D.

It combines the results of vulnerability and penetration tests to provide useful insights into the network's overall threat and security posture.

D.

It combines the results of vulnerability and penetration tests to provide useful insights into the network's overall threat and security posture.

Answers
Suggested answer: C

Explanation:

a network threat model helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.

It is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?

A.

Breaches of an individual's data.

A.

Breaches of an individual's data.

Answers
B.

Illicit collection of personal data.

B.

Illicit collection of personal data.

Answers
C.

Manipulation of a user's choice.

C.

Manipulation of a user's choice.

Answers
D.

Discrimination from profiling.

D.

Discrimination from profiling.

Answers
Suggested answer: C

Explanation:

it is important for a privacy technologist to understand dark patterns in order to reduce the risk of manipulation of a user's choice. Dark patterns are user interface design choices that are intended to manipulate users into taking actions they might not otherwise take.


What is the key idea behind the 'flow' component of Nissenbaum's contextual integrity model?

A.

The flow of information from one actor to another.

A.

The flow of information from one actor to another.

Answers
B.

The integrity of information during each stage of the data lifecycle.

B.

The integrity of information during each stage of the data lifecycle.

Answers
C.

The maintenance of accuracy when personal information is transmitted.

C.

The maintenance of accuracy when personal information is transmitted.

Answers
D.

The movement of personal information within a particular context or domain.

D.

The movement of personal information within a particular context or domain.

Answers
Suggested answer: D

Explanation:

The 'flow' component of Nissenbaum's contextual integrity model refers to how personal information moves within a particular context or domain. This model emphasizes that privacy is maintained when information flows according to norms appropriate to that context. For example, health information shared between a patient and doctor should not be shared outside the medical context without consent.

IAPP CIPT Study Guide, 'Privacy Frameworks and Models,' which discusses Nissenbaum's contextual integrity model and its components, including the flow of information within contexts.

Which of the following is the most important action to take prior to collecting personal data directly from a customer?

A.

Define what data needs to be collected.

A.

Define what data needs to be collected.

Answers
B.

Define the purpose for collecting and using the data.

B.

Define the purpose for collecting and using the data.

Answers
C.

Identify business requirements for the data that will be collected.

C.

Identify business requirements for the data that will be collected.

Answers
D.

Provide individuals with information about how their data will be used after collection.

D.

Provide individuals with information about how their data will be used after collection.

Answers
Suggested answer: B

Explanation:

The most important action before collecting personal data directly from a customer is to define the purpose for collecting and using the data. This step ensures that the data collection is justified and that customers are informed about how their data will be used, which is crucial for gaining their trust and compliance with data protection regulations.

IAPP CIPT Study Guide, 'Data Collection and Use,' which emphasizes the necessity of defining the purpose of data collection as a key principle of data privacy and protection.

Which Privacy by Design principle requires architects and operators to emphasize the interests of the individual by offering measures such as strong privacy defaults, appropriate notice, and user-friendly options?

A.

Data lifecycle protection.

A.

Data lifecycle protection.

Answers
B.

Embedded into design.

B.

Embedded into design.

Answers
C.

Respect for user privacy.

C.

Respect for user privacy.

Answers
D.

Proactive not reactive.

D.

Proactive not reactive.

Answers
Suggested answer: C

Explanation:

The Privacy by Design principle that requires architects and operators to emphasize the interests of the individual by offering measures such as strong privacy defaults, appropriate notice, and user-friendly options is 'Respect for user privacy.' This principle ensures that user-centric privacy measures are embedded into the design and operation of systems.

IAPP CIPT Study Guide, 'Privacy by Design,' which outlines the seven foundational principles of Privacy by Design, including respect for user privacy and its emphasis on user-centric measures.


Which of the following would be an example of an 'objective' privacy harm to an individual, based on Calo's Harm Dimensions?

A.

Receiving spam following the sale of an email address.

A.

Receiving spam following the sale of an email address.

Answers
B.

Negative feelings derived from government surveillance.

B.

Negative feelings derived from government surveillance.

Answers
C.

Social media profile views indicating unexpected interest in a person.

C.

Social media profile views indicating unexpected interest in a person.

Answers
D.

Personal data inaccuracies present in a user's social media profile.

D.

Personal data inaccuracies present in a user's social media profile.

Answers
Suggested answer: A

Explanation:

Ryan Calo's Harm Dimensions categorize privacy harms into two types: objective and subjective. Objective privacy harms are tangible, measurable, and involve actual harm to individuals. Receiving spam following the sale of an email address is a concrete, quantifiable harm that directly impacts the individual by causing inconvenience and potential security risks. This contrasts with subjective harms, which are more about perceptions and feelings, such as negative feelings derived from government surveillance (option B). The IAPP documentation reflects this distinction by emphasizing the importance of identifying and mitigating objective harms to ensure robust privacy protections.

Which of the following is an example of an appropriation harm?

A.

A friend takes and uploads your pictures to a social media website.

A.

A friend takes and uploads your pictures to a social media website.

Answers
B.

A hacker gains access to your email account and reads your messages.

B.

A hacker gains access to your email account and reads your messages.

Answers
C.

A govemment agency uses cameras to monitor your movements in a public area.

C.

A govemment agency uses cameras to monitor your movements in a public area.

Answers
D.

An unauthorized individual obtains access to your personal information and uses it for medical fraud.

D.

An unauthorized individual obtains access to your personal information and uses it for medical fraud.

Answers
Suggested answer: D

Explanation:

Appropriation harms occur when someone's personal information is used without their consent, often for malicious purposes. An unauthorized individual obtaining access to personal information and using it for medical fraud is a clear example of appropriation harm because it involves the misuse of someone's personal data for fraudulent activities, potentially causing significant financial and personal damage to the victim. The IAPP emphasizes that appropriation harms are serious privacy violations that require stringent safeguards to protect individuals' personal data from unauthorized use.

Which of the following is NOT a factor to consider in FAIR analysis?

A.

The severity of the harm that might be caused by the privacy risk.

A.

The severity of the harm that might be caused by the privacy risk.

Answers
B.

The capability of a threat actor to exploit the analyzed privacy risk.

B.

The capability of a threat actor to exploit the analyzed privacy risk.

Answers
C.

The stage of the data life cycle in which the analyzed privacy risk occurs.

C.

The stage of the data life cycle in which the analyzed privacy risk occurs.

Answers
D.

The probability that a threat actor's attempts to exploit a privacy risk might succeed.

D.

The probability that a threat actor's attempts to exploit a privacy risk might succeed.

Answers
Suggested answer: C

Explanation:

FAIR (Factor Analysis of Information Risk) analysis is a structured approach to understanding, analyzing, and quantifying information risks. The core factors in FAIR analysis include the severity of the harm (option A), the capability of a threat actor (option B), and the probability of a threat actor's success (option D). The stage of the data life cycle, while important in understanding data management practices, is not a direct factor in the FAIR analysis framework. According to IAPP documentation, FAIR analysis focuses on quantifying risk factors to evaluate and manage privacy risks effectively, emphasizing measurable and actionable components rather than the data life cycle stage.

Total 220 questions
Go to page: of 22