ExamGecko
Home Home / IAPP / CIPT

IAPP CIPT Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions




SCENARIO Carol was a U.S.-based glassmaker who sold her work at art festivals. She kept things simple by only accepting cash and personal checks. As business grew, Carol couldn't keep up with demand, and traveling to festivals became burdensome. Carol opened a small boutique and hired Sam to run it while she worked in the studio. Sam was a natural salesperson, and business doubled. Carol told Sam, "I don't know what you are doing, but keep doing it!" But months later, the gift shop was in chaos. Carol realized that Sam needed help so she hired Jane, who had business expertise and could handle the back-office tasks. Sam would continue to focus on sales. Carol gave Jane a few weeks to get acquainted with the artisan craft business, and then scheduled a meeting for the three of them to discuss Jane's first impressions. At the meeting, Carol could not wait to hear Jane's thoughts, but she was unprepared for what Jane had to say. "Carol, I know that he doesn't realize it, but some of Sam's efforts to increase sales have put you in a vulnerable position. You are not protecting customers' personal information like you should." Sam said, "I am protecting our information. I keep it in the safe with our bank deposit. It's only a list of customers' names, addresses and phone numbers that I get from their checks before I deposit them. I contact them when you finish a piece that I think they would like. That's the only information I have! The only other thing I do is post photos and information about your work on the photo sharing site that I use with family and friends. I provide my email address and people send me their information if they want to see more of your work. Posting online really helps sales, Carol. In fact, the only complaint I hear is about having to come into the shop to make a purchase." Carol replied, "Jane, that doesn't sound so bad. Could you just fix things and help us to post even more online?" 'I can," said Jane. "But it's not quite that simple. I need to set up a new program to make sure that we follow the best practices in data management. And I am concerned for our customers. They should be able to manage how we use their personal information. We also should develop a social media strategy." Sam and Jane worked hard during the following year. One of the decisions they made was to contract with an outside vendor to manage online sales. At the end of the year, Carol shared some exciting news. "Sam and Jane, you have done such a great job that one of the biggest names in the glass business wants to buy us out! And Jane, they want to talk to you about merging all of our customer and vendor information with theirs beforehand." What type of principles would be the best guide for Jane's ideas regarding a new data management program?


SCENARIO Please use the following to answer the next questions: Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed: • "I consent to receive notifications and infection alerts"; • "I consent to receive information on additional features or services, and new products"; • "I consent to sharing only my risk result and location information, for exposure and contact tracing purposes"; • "I consent to share my data for medical research purposes"; and • "I consent to share my data with healthcare providers affiliated to the company". For each choice, an ON* or OFF tab is available The default setting is ON for all Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening service works as follows: • Step 1 A photo of the user's face is taken. • Step 2 The user measures their temperature and adds the reading in the app • Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms • Step 4 The user is asked to answer questions on known symptoms • Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).) The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider. A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium' or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles Which of the following is likely to be the most important issue with the choices presented in the 'Information Sharing and Consent' pages?





Which of the following is considered a records management best practice?

A.

Archiving expired data records and files.

A.

Archiving expired data records and files.

Answers
B.

Storing decryption keys with their associated backup systems.

B.

Storing decryption keys with their associated backup systems.

Answers
C.

Implementing consistent handling practices across all record types.

C.

Implementing consistent handling practices across all record types.

Answers
D.

Using classification to determine access rules and retention policy.

D.

Using classification to determine access rules and retention policy.

Answers
Suggested answer: D

Explanation:

Reference: https://www.archive-vault.co.uk/best-practice-for-records-management

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

A.

The Open ID Federation.

A.

The Open ID Federation.

Answers
B.

PCI Data Security Standards Council

B.

PCI Data Security Standards Council

Answers
C.

International Organization for Standardization.

C.

International Organization for Standardization.

Answers
D.

Personal Information Protection and Electronic Documents Act.

D.

Personal Information Protection and Electronic Documents Act.

Answers
Suggested answer: A

A user who owns a resource wants to give other individuals access to the resource. What control would apply?

A.

Mandatory access control.

A.

Mandatory access control.

Answers
B.

Role-based access controls.

B.

Role-based access controls.

Answers
C.

Discretionary access control.

C.

Discretionary access control.

Answers
D.

Context of authority controls.

D.

Context of authority controls.

Answers
Suggested answer: B

Explanation:

Reference: https://docs.microsoft.com/bs-latn-ba/azure/role-based-access-control/overview

What is the potential advantage of homomorphic encryption?

A.

Encrypted information can be analyzed without decrypting it first.

A.

Encrypted information can be analyzed without decrypting it first.

Answers
B.

Ciphertext size decreases as the security level increases.

B.

Ciphertext size decreases as the security level increases.

Answers
C.

It allows greater security and faster processing times.

C.

It allows greater security and faster processing times.

Answers
D.

It makes data impenetrable to attacks.

D.

It makes data impenetrable to attacks.

Answers
Suggested answer: C

Explanation:

Reference: https://www.sciencedirect.com/topics/computer-science/homomorphic-encryption

What has been found to undermine the public key infrastructure system?

A.

Man-in-the-middle attacks.

A.

Man-in-the-middle attacks.

Answers
B.

Inability to track abandoned keys.

B.

Inability to track abandoned keys.

Answers
C.

Disreputable certificate authorities.

C.

Disreputable certificate authorities.

Answers
D.

Browsers missing a copy of the certificate authority's public key.

D.

Browsers missing a copy of the certificate authority's public key.

Answers
Suggested answer: D

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. "The old man hired and fired IT people like he was changing his necktie," one of Wilson's seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive dat a. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

The company's proprietary recovery process for shale oil is stored on servers among a variety of lesssensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

DES is the strongest encryption algorithm currently used for any file.

Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which is true regarding the type of encryption Lancelot uses?

A.

It employs the data scrambling technique known as obfuscation.

A.

It employs the data scrambling technique known as obfuscation.

Answers
B.

Its decryption key is derived from its encryption key.

B.

Its decryption key is derived from its encryption key.

Answers
C.

It uses a single key for encryption and decryption.

C.

It uses a single key for encryption and decryption.

Answers
D.

It is a data masking methodology.

D.

It is a data masking methodology.

Answers
Suggested answer: C

Explanation:

It uses a single key for encryption and decryption. In the scenario, it is mentioned that Lancelot uses symmetric encryption to protect its data. Symmetric encryption uses a single key for both encryption and decryption.

SCENARIO

Wesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson's quirky nature affected even Lancelot's data practices, which are maddeningly inconsistent. "The old man hired and fired IT people like he was changing his necktie," one of Wilson's seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.

For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive dat a. You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.

Among your preliminary findings of the condition of data at Lancelot are the following:

Cloud technology is supplied by vendors around the world, including firms that you have not heard of. You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.

The company's proprietary recovery process for shale oil is stored on servers among a variety of lesssensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.

DES is the strongest encryption algorithm currently used for any file.

Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.

Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.

Which procedure should be employed to identify the types and locations of data held by Wesley Energy?

A.

Privacy audit.

A.

Privacy audit.

Answers
B.

Log collection

B.

Log collection

Answers
C.

Data inventory.

C.

Data inventory.

Answers
D.

Data classification.

D.

Data classification.

Answers
Suggested answer: C

Explanation:

To identify the types and locations of data held by Wesley Energy, a data inventory should be employed. A data inventory involves creating a comprehensive record of all the data held by an organization, including information about its type and location.

A credit card with the last few numbers visible is an example of what?

A.

Masking data

A.

Masking data

Answers
B.

Synthetic data

B.

Synthetic data

Answers
C.

Sighting controls.

C.

Sighting controls.

Answers
D.

Partial encryption

D.

Partial encryption

Answers
Suggested answer: A

Explanation:

Reference: https://money.stackexchange.com/questions/98951/credit-card-number-masking-goodpractices-rules-law-regulations

What is an example of a just-in-time notice?

A.

A warning that a website may be unsafe.

A.

A warning that a website may be unsafe.

Answers
B.

A full organizational privacy notice publicly available on a website

B.

A full organizational privacy notice publicly available on a website

Answers
C.

A credit card company calling a user to verify a purchase before itis authorized

C.

A credit card company calling a user to verify a purchase before itis authorized

Answers
D.

Privacy information given to a user when he attempts to comment on an online article.

D.

Privacy information given to a user when he attempts to comment on an online article.

Answers
Suggested answer: D

Explanation:

Reference: https://www.clarip.com/data-privacy/just-time-notices/

A vendor has been collecting data under an old contract, not aligned with the practices of the organization.

Which is the preferred response?

A.

Destroy the data

A.

Destroy the data

Answers
B.

Update the contract to bring the vendor into alignment.

B.

Update the contract to bring the vendor into alignment.

Answers
C.

Continue the terms of the existing contract until it expires.

C.

Continue the terms of the existing contract until it expires.

Answers
D.

Terminate the contract and begin a vendor selection process.

D.

Terminate the contract and begin a vendor selection process.

Answers
Suggested answer: B
Total 220 questions
Go to page: of 22