ExamGecko
Home Home / IAPP / CIPT

IAPP CIPT Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions





SCENARIO Please use the following to answer the next questions: Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed: • "I consent to receive notifications and infection alerts"; • "I consent to receive information on additional features or services, and new products"; • "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes"; • "I consent to share my data for medical research purposes"; and • "I consent to share my data with healthcare providers affiliated to the company". For each choice, an ON* or OFF tab is available The default setting is ON for all Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening service works as follows: • Step 1 A photo of the user's face is taken. • Step 2 The user measures their temperature and adds the reading in the app • Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms • Step 4 The user is asked to answer questions on known symptoms • Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).) The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider. A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium' or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?






Which is NOT a suitable method for assuring the quality of data collected by a third-party company?

A.

Verifying the accuracy of the data by contacting users.

A.

Verifying the accuracy of the data by contacting users.

Answers
B.

Validating the company's data collection procedures.

B.

Validating the company's data collection procedures.

Answers
C.

Introducing erroneous data to see if its detected.

C.

Introducing erroneous data to see if its detected.

Answers
D.

Tracking changes to data through auditing.

D.

Tracking changes to data through auditing.

Answers
Suggested answer: C

Explanation:

Introducing erroneous data to see if it's detected is not a suitable method for assuring the quality of data collected by a third-party company1. This method could compromise the integrity and reliability of the data and cause confusion or harm to the users or the business1. The other options are suitable methods for assuring the quality of data collected by a third-party company1. Verifying the accuracy of the data by contacting users can help identify and correct any errors or inconsistencies in the data1. Validating the company's data collection procedures can help ensure that they follow best practices and standards for collecting, storing, and processing personal information1. Tracking changes to data through auditing can help monitor and document any modifications or deletions made to the data1.

https://www.isaca.org/resources/news-and-trends/industry-news/2021/data-minimization-apractical-approach

A valid argument against data minimization is that it?

A.

Can limit business opportunities.

A.

Can limit business opportunities.

Answers
B.

Decreases the speed of data transfers.

B.

Decreases the speed of data transfers.

Answers
C.

Can have an adverse effect on data quality.

C.

Can have an adverse effect on data quality.

Answers
D.

Increases the chance that someone can be identified from data.

D.

Increases the chance that someone can be identified from data.

Answers
Suggested answer: A

Explanation:

A valid argument against data minimization is that it can limit business opportunities23. Data minimization refers to limiting the collection, storage, and processing of personal information to only what is strictly necessary for business operations3. While this practice can help protect privacy and security, it can also restrict the potential uses and benefits of data for innovation, research, marketing, analytics etc.23. The other options are not valid arguments against data minimization, but rather arguments in favor of it23.

https://www.manageengine.com/data-security/what-is/data-minimization.html

What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?

A.

The implied consent model provides the user with more detailed data collection information.

A.

The implied consent model provides the user with more detailed data collection information.

Answers
B.

To secure explicit consent, a user's website browsing would be significantly disrupted.

B.

To secure explicit consent, a user's website browsing would be significantly disrupted.

Answers
C.

An explicit consent model is more expensive to implement.

C.

An explicit consent model is more expensive to implement.

Answers
D.

Regulators prefer the implied consent model.

D.

Regulators prefer the implied consent model.

Answers
Suggested answer: A

What is the main benefit of using dummy data during software testing?

A.

The data comes in a format convenient for testing.

A.

The data comes in a format convenient for testing.

Answers
B.

Statistical disclosure controls are applied to the data.

B.

Statistical disclosure controls are applied to the data.

Answers
C.

The data enables the suppression of particular values in a set.

C.

The data enables the suppression of particular values in a set.

Answers
D.

Developers do not need special privacy training to test the software.

D.

Developers do not need special privacy training to test the software.

Answers
Suggested answer: D

How does k-anonymity help to protect privacy in micro data sets?

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

Answers
B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

Answers
C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

Answers
D.

By top-coding all age data above a value of "k."

D.

By top-coding all age data above a value of "k."

Answers
Suggested answer: A

Explanation:

Reference: https://www.researchgate.net/publication/284332229_k-nonymity_A_Model_for_Protecting_Privacy

Which of the following statements describes an acceptable disclosure practice?

A.

An organization's privacy policy discloses how data will be used among groups within the organization itself.

A.

An organization's privacy policy discloses how data will be used among groups within the organization itself.

Answers
B.

With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.

B.

With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.

Answers
C.

Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.

C.

Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.

Answers
D.

When an organization discloses data to a vendor, the terms of the vendor' privacy notice prevail over the organization' privacy notice.

D.

When an organization discloses data to a vendor, the terms of the vendor' privacy notice prevail over the organization' privacy notice.

Answers
Suggested answer: A

How should the sharing of information within an organization be documented?

A.

With a binding contract.

A.

With a binding contract.

Answers
B.

With a data flow diagram.

B.

With a data flow diagram.

Answers
C.

With a disclosure statement.

C.

With a disclosure statement.

Answers
D.

With a memorandum of agreement.

D.

With a memorandum of agreement.

Answers
Suggested answer: C

What can be used to determine the type of data in storage without exposing its contents?

A.

Collection records.

A.

Collection records.

Answers
B.

Data mapping.

B.

Data mapping.

Answers
C.

Server logs.

C.

Server logs.

Answers
D.

Metadata.

D.

Metadata.

Answers
Suggested answer: D

Explanation:

Reference: https://cloud.google.com/storage/docs/gsutil/addlhelp/WorkingWithObjectMetadata

What must be done to destroy data stored on "write once read many" (WORM) media?

A.

The data must be made inaccessible by encryption.

A.

The data must be made inaccessible by encryption.

Answers
B.

The erase function must be used to remove all data.

B.

The erase function must be used to remove all data.

Answers
C.

The media must be physically destroyed.

C.

The media must be physically destroyed.

Answers
D.

The media must be reformatted.

D.

The media must be reformatted.

Answers
Suggested answer: C

Which of the following would best improve an organization' s system of limiting data use?

A.

Implementing digital rights management technology.

A.

Implementing digital rights management technology.

Answers
B.

Confirming implied consent for any secondary use of data.

B.

Confirming implied consent for any secondary use of data.

Answers
C.

Applying audit trails to resources to monitor company personnel.

C.

Applying audit trails to resources to monitor company personnel.

Answers
D.

Instituting a system of user authentication for company personnel.

D.

Instituting a system of user authentication for company personnel.

Answers
Suggested answer: C
Total 220 questions
Go to page: of 22