ExamGecko
Home / IAPP / CIPT / List of questions
Ask Question

IAPP CIPT Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which of the following is considered a records management best practice?

Archiving expired data records and files.

Archiving expired data records and files.

Storing decryption keys with their associated backup systems.

Storing decryption keys with their associated backup systems.

Implementing consistent handling practices across all record types.

Implementing consistent handling practices across all record types.

Using classification to determine access rules and retention policy.

Using classification to determine access rules and retention policy.

Suggested answer: D
Explanation:

Reference: https://www.archive-vault.co.uk/best-practice-for-records-management

asked 22/11/2024
Valerio Pietrantoni
49 questions

Question 32

Report Export Collapse

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

The Open ID Federation.

The Open ID Federation.

PCI Data Security Standards Council

PCI Data Security Standards Council

International Organization for Standardization.

International Organization for Standardization.

Personal Information Protection and Electronic Documents Act.

Personal Information Protection and Electronic Documents Act.

Suggested answer: A
asked 22/11/2024
Babatunde Ipaye
48 questions

Question 33

Report Export Collapse

A user who owns a resource wants to give other individuals access to the resource. What control would apply?

Mandatory access control.

Mandatory access control.

Role-based access controls.

Role-based access controls.

Discretionary access control.

Discretionary access control.

Context of authority controls.

Context of authority controls.

Suggested answer: B
Explanation:

Reference: https://docs.microsoft.com/bs-latn-ba/azure/role-based-access-control/overview

asked 22/11/2024
Hari Krishnan
39 questions

Question 34

Report Export Collapse

What is the potential advantage of homomorphic encryption?

Encrypted information can be analyzed without decrypting it first.

Encrypted information can be analyzed without decrypting it first.

Ciphertext size decreases as the security level increases.

Ciphertext size decreases as the security level increases.

It allows greater security and faster processing times.

It allows greater security and faster processing times.

It makes data impenetrable to attacks.

It makes data impenetrable to attacks.

Suggested answer: C
Explanation:

Reference: https://www.sciencedirect.com/topics/computer-science/homomorphic-encryption

asked 22/11/2024
Martin Schwarz
44 questions

Question 35

Report Export Collapse

What has been found to undermine the public key infrastructure system?

Man-in-the-middle attacks.

Man-in-the-middle attacks.

Inability to track abandoned keys.

Inability to track abandoned keys.

Disreputable certificate authorities.

Disreputable certificate authorities.

Browsers missing a copy of the certificate authority's public key.

Browsers missing a copy of the certificate authority's public key.

Suggested answer: D
asked 22/11/2024
Olive Wang
45 questions

Question 36

Report Export Collapse

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. "The old man hired and fired IT people like he was changing his necktie," one of Wilson's seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive dat a. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

The company's proprietary recovery process for shale oil is stored on servers among a variety of lesssensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

DES is the strongest encryption algorithm currently used for any file.

Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which is true regarding the type of encryption Lancelot uses?

It employs the data scrambling technique known as obfuscation.

It employs the data scrambling technique known as obfuscation.

Its decryption key is derived from its encryption key.

Its decryption key is derived from its encryption key.

It uses a single key for encryption and decryption.

It uses a single key for encryption and decryption.

It is a data masking methodology.

It is a data masking methodology.

Suggested answer: C
Explanation:

It uses a single key for encryption and decryption. In the scenario, it is mentioned that Lancelot uses symmetric encryption to protect its data. Symmetric encryption uses a single key for both encryption and decryption.

asked 22/11/2024
Fednol Presume
40 questions

Question 37

Report Export Collapse

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. "The old man hired and fired IT people like he was changing his necktie," one of Wilson's seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive dat a. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

The company's proprietary recovery process for shale oil is stored on servers among a variety of lesssensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

DES is the strongest encryption algorithm currently used for any file.

Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

Privacy audit.

Privacy audit.

Log collection

Log collection

Data inventory.

Data inventory.

Data classification.

Data classification.

Suggested answer: C
Explanation:

To identify the types and locations of data held by Wesley Energy, a data inventory should be employed. A data inventory involves creating a comprehensive record of all the data held by an organization, including information about its type and location.

asked 22/11/2024
Judith Persons
49 questions

Question 38

Report Export Collapse

A credit card with the last few numbers visible is an example of what?

Masking data

Masking data

Synthetic data

Synthetic data

Sighting controls.

Sighting controls.

Partial encryption

Partial encryption

Suggested answer: A
Explanation:

Reference: https://money.stackexchange.com/questions/98951/credit-card-number-masking-goodpractices-rules-law-regulations

asked 22/11/2024
louishn vn
39 questions

Question 39

Report Export Collapse

What is an example of a just-in-time notice?

A warning that a website may be unsafe.

A warning that a website may be unsafe.

A full organizational privacy notice publicly available on a website

A full organizational privacy notice publicly available on a website

A credit card company calling a user to verify a purchase before itis authorized

A credit card company calling a user to verify a purchase before itis authorized

Privacy information given to a user when he attempts to comment on an online article.

Privacy information given to a user when he attempts to comment on an online article.

Suggested answer: D
Explanation:

Reference: https://www.clarip.com/data-privacy/just-time-notices/

asked 22/11/2024
Fabio Zannetti
45 questions

Question 40

Report Export Collapse

A vendor has been collecting data under an old contract, not aligned with the practices of the organization.

Which is the preferred response?

Destroy the data

Destroy the data

Update the contract to bring the vendor into alignment.

Update the contract to bring the vendor into alignment.

Continue the terms of the existing contract until it expires.

Continue the terms of the existing contract until it expires.

Terminate the contract and begin a vendor selection process.

Terminate the contract and begin a vendor selection process.

Suggested answer: B
asked 22/11/2024
HAZEM SHAIKHANI
47 questions
Total 220 questions
Go to page: of 22

Related questions

SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client's office to perform an onsite review of the client's operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client's office. The car rental agreement was electronically signed by Chuck and included his name, address, driver's license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file. Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine. After reviewing the incident through the AMP Payment Resources' web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental. What is the strongest method for authenticating Chuck's identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker. The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll. This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker. To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks. The results of this initial work include the following notes: There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome. You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure. There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system. Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker. All the WebTracker and SmartHome customers are based in USA and Canada. Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?