IAPP CIPT Practice Test - Questions Answers, Page 22
List of questions
Related questions
All of the following topics should be included in a workplace surveillance policy EXCEPT?
Who can be tracked and when.
Who can access surveillance data.
What areas can be placed under surveillance.
Who benefits from collecting surveillance data.
What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?
Web beacon tracking.
Browser fingerprinting.
Entity tagging.
Canvas fingerprinting.
of the following best describes a network threat model and Its uses?
It Is used in software development to detect programming errors.
It is a risk-based model used to calculate the probabilities of risks identified during vulnerability tests.
It helps assess the probability, the potential harm, and the priority of attacks to help minimize or eradicate the threats.
It combines the results of vulnerability and penetration tests to provide useful insights into the network's overall threat and security posture.
It is Important for a privacy technologist to understand dark patterns In order to reduce the risk of which of the following?
Breaches of an individual's data.
Illicit collection of personal data.
Manipulation of a user's choice.
Discrimination from profiling.
What is the key idea behind the 'flow' component of Nissenbaum's contextual integrity model?
The flow of information from one actor to another.
The integrity of information during each stage of the data lifecycle.
The maintenance of accuracy when personal information is transmitted.
The movement of personal information within a particular context or domain.
Which of the following is the most important action to take prior to collecting personal data directly from a customer?
Define what data needs to be collected.
Define the purpose for collecting and using the data.
Identify business requirements for the data that will be collected.
Provide individuals with information about how their data will be used after collection.
Which Privacy by Design principle requires architects and operators to emphasize the interests of the individual by offering measures such as strong privacy defaults, appropriate notice, and user-friendly options?
Data lifecycle protection.
Embedded into design.
Respect for user privacy.
Proactive not reactive.
Which of the following would be an example of an 'objective' privacy harm to an individual, based on Calo's Harm Dimensions?
Receiving spam following the sale of an email address.
Negative feelings derived from government surveillance.
Social media profile views indicating unexpected interest in a person.
Personal data inaccuracies present in a user's social media profile.
Which of the following is an example of an appropriation harm?
A friend takes and uploads your pictures to a social media website.
A hacker gains access to your email account and reads your messages.
A govemment agency uses cameras to monitor your movements in a public area.
An unauthorized individual obtains access to your personal information and uses it for medical fraud.
Which of the following is NOT a factor to consider in FAIR analysis?
The severity of the harm that might be caused by the privacy risk.
The capability of a threat actor to exploit the analyzed privacy risk.
The stage of the data life cycle in which the analyzed privacy risk occurs.
The probability that a threat actor's attempts to exploit a privacy risk might succeed.
Question