ExamGecko
Home / IAPP / CIPT / List of questions
Ask Question

IAPP CIPT Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Most web browsers incorporate the DNT feature.

Most web browsers incorporate the DNT feature.

The financial penalties for violating DNT guidelines are too high.

The financial penalties for violating DNT guidelines are too high.

There is a lack of consensus about what the DNT header should mean.

There is a lack of consensus about what the DNT header should mean.

It has been difficult to solve the technological challenges surrounding DNT.

It has been difficult to solve the technological challenges surrounding DNT.

Suggested answer: C
Explanation:

Reference: https://en.wikipedia.org/wiki/Do_Not_Track

asked 22/11/2024
Richard Drayer Camacho
41 questions

Question 62

Report Export Collapse

Why is first-party web tracking very difficult to prevent?

The available tools to block tracking would break most sites' functionality.

The available tools to block tracking would break most sites' functionality.

Consumers enjoy the many benefits they receive from targeted advertising.

Consumers enjoy the many benefits they receive from targeted advertising.

Regulatory frameworks are not concerned with web tracking.

Regulatory frameworks are not concerned with web tracking.

Most browsers do not support automatic blocking.

Most browsers do not support automatic blocking.

Suggested answer: D
Explanation:

Reference: https://www.opentracker.net/article/third-party-cookies-vs-first-party-cookies

asked 22/11/2024
Ayyaz Rehan Ikram
32 questions

Question 63

Report Export Collapse

During a transport layer security (TLS) session, what happens immediately after the web browser creates a random PreMasterSecret?

The server decrypts the PremasterSecret.

The server decrypts the PremasterSecret.

The web browser opens a TLS connection to the PremasterSecret.

The web browser opens a TLS connection to the PremasterSecret.

The web browser encrypts the PremasterSecret with the server's public key.

The web browser encrypts the PremasterSecret with the server's public key.

The server and client use the same algorithm to convert the PremasterSecret into an encryption key.

The server and client use the same algorithm to convert the PremasterSecret into an encryption key.

Suggested answer: C
Explanation:

Reference: https://books.google.com.pk/books?id=OaXise4Bp8C&pg=PA175&lpg=PA175&dq=iapp+During+a+transport+layer+security+(TLS)+session,+what+happens+immediately+after+the+web+browser+creates+a+random+PreMasterSecret&source=bl&ots=zR0RCfnx3c&sig=ACfU3U0bTOeOfPfcoq_Y95SZs6imKKilug&hl=en&sa=X&ved=2ahUKEwjkscDHpcbnAhUJuRoKHU5iC9cQ6AEwCnoECAkQAQ#v=onepage&q=iapp%20During%20a%20transport%20layer%20security%20(TLS)%20session%2C%20what%20happens%20immediately%20after%20the%20web%20browser%20creates%20a%20random%20PreMasterSecret&f=false

asked 22/11/2024
Juan Yontz
53 questions

Question 64

Report Export Collapse

What is the main benefit of using a private cloud?

The ability to use a backup system for personal files.

The ability to use a backup system for personal files.

The ability to outsource data support to a third party.

The ability to outsource data support to a third party.

The ability to restrict data access to employees and contractors.

The ability to restrict data access to employees and contractors.

The ability to cut costs for storing, maintaining, and accessing data.

The ability to cut costs for storing, maintaining, and accessing data.

Suggested answer: C
asked 22/11/2024
Vincent Chung
43 questions

Question 65

Report Export Collapse

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as "My Cool Ride" for automobile-related products or "Zoomer" for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards.

Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company's culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company's product lines as well as products from affiliates. This new omnibus site will be known, aptly, as "Under the Sun." The Director of Marketing wants the site not only to sell Ancillary's products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?

Unseen web beacons that combine information on multiple users.

Unseen web beacons that combine information on multiple users.

Latent keys that trigger malware when an advertisement is selected.

Latent keys that trigger malware when an advertisement is selected.

Personal information collected by cookies linked to the advertising network.

Personal information collected by cookies linked to the advertising network.

Sensitive information from Structured Query Language (SQL) commands that may be exposed.

Sensitive information from Structured Query Language (SQL) commands that may be exposed.

Suggested answer: C
Explanation:

The most important aspect to cover when advising on privacy concerns regarding paid advertisements would be C. Personal information collected by cookies linked to the advertising network. Cookies are small text files that are stored on a user's device by websites and advertising networks. They can be used to track a user's browsing behavior and collect personal information.

This can raise privacy concerns as users may not be aware of the extent of data collection and how their personal information is being used.

asked 22/11/2024
Jess Kendrick Gamboa
39 questions

Question 66

Report Export Collapse

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as "My Cool Ride" for automobile-related products or "Zoomer" for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards.

Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company's culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company's product lines as well as products from affiliates. This new omnibus site will be known, aptly, as "Under the Sun." The Director of Marketing wants the site not only to sell Ancillary's products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

What technology is under consideration in the first project in this scenario?

Server driven controls.

Server driven controls.

Cloud computing

Cloud computing

Data on demand

Data on demand

MAC filtering

MAC filtering

Suggested answer: B
Explanation:

The technology under consideration in the first project in this scenario is B. Cloud computing. In the scenario, it is mentioned that the first project involves migrating data and applications to a cloudbased infrastructure.

asked 22/11/2024
Mogens Jensen
38 questions

Question 67

Report Export Collapse

SCENARIO

You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.

Ancillary's operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving. However, the company now sells online through retail sites designated for industries and demographics, sites such as "My Cool Ride" for automobile-related products or "Zoomer" for gear aimed toward young adults. The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards.

Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.

You have been asked to lead three important new projects at Ancillary:

The first is the personal data management and security component of a multi-faceted initiative to unify the company's culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.

The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.

Finally, you are charged with developing privacy protections for a single web store housing all the company's product lines as well as products from affiliates. This new omnibus site will be known, aptly, as "Under the Sun." The Director of Marketing wants the site not only to sell Ancillary's products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.

Which should be used to allow the home sales force to accept payments using smartphones?

Field transfer protocol.

Field transfer protocol.

Cross-current translation.

Cross-current translation.

Near-field communication

Near-field communication

Radio Frequency Identification

Radio Frequency Identification

Suggested answer: C
Explanation:

The technology that should be used to allow the home sales force to accept payments using smartphones is C. Near-field communication (NFC). NFC is a short-range wireless technology that allows devices to exchange data when they are brought close together. This technology is commonly used in contactless payment systems and can be used to enable smartphones to accept payments.

asked 22/11/2024
Vetti Paiyan
32 questions

Question 68

Report Export Collapse

What is the best way to protect privacy on a geographic information system (GIS)?

Limiting the data provided to the system.

Limiting the data provided to the system.

Using a wireless encryption protocol.

Using a wireless encryption protocol.

Scrambling location information.

Scrambling location information.

Using a firewall.

Using a firewall.

Suggested answer: A
Explanation:

Reference:

https://www.researchgate.net/publication/2873114_Protecting_Personal_Privacy_in_Using_Geographic_Information_Systems

asked 22/11/2024
Donald Wu
41 questions

Question 69

Report Export Collapse

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

By hand coding software routines with a specific set of instructions to accomplish a task.

By hand coding software routines with a specific set of instructions to accomplish a task.

Suggested answer: B
Explanation:

Reference: https://towardsdatascience.com/notes-on-artificial-intelligence-ai-machine-learning-mland-deep-learning-dl-for-56e51a2071c2

asked 22/11/2024
Raajhavelu Rengaraj
24 questions

Question 70

Report Export Collapse

Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?

A group of hackers infiltrate a power grid and cause a major blackout.

A group of hackers infiltrate a power grid and cause a major blackout.

An insurance company raises a person's rates based on driving habits gathered from a connected car.

An insurance company raises a person's rates based on driving habits gathered from a connected car.

A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits.

A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits.

A water district fines an individual after a meter reading reveals excess water use during drought conditions.

A water district fines an individual after a meter reading reveals excess water use during drought conditions.

Suggested answer: B
asked 22/11/2024
Fu Sin
39 questions
Total 220 questions
Go to page: of 22

Related questions

SCENARIO Please use the following to answer the next question: Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client's office to perform an onsite review of the client's operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client's office. The car rental agreement was electronically signed by Chuck and included his name, address, driver's license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file. Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine. After reviewing the incident through the AMP Payment Resources' web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental. What is the strongest method for authenticating Chuck's identity prior to allowing access to his violation information through the AMP Payment Resources web portal?

SCENARIO WebTracker Limited is a cloud-based online marketing service located in London. Last year, WebTracker migrated its IT infrastructure to the cloud provider AmaZure, which provides SQL Databases and Artificial Intelligence services to WebTracker. The roles and responsibilities between the two companies have been formalized in a standard contract, which includes allocating the role of data controller to WebTracker. The CEO of WebTracker, Mr. Bond, would like to assess the effectiveness of AmaZure's privacy controls, and he recently decided to hire you as an independent auditor. The scope of the engagement is limited only to the marketing services provided by WebTracker, you will not be evaluating any internal data processing activity, such as HR or Payroll. This ad-hoc audit was triggered due to a future partnership between WebTracker and SmartHome — a partnership that will not require any data sharing. SmartHome is based in the USA, and most recently has dedicated substantial resources to developing smart refrigerators that can suggest the recommended daily calorie intake based on DNA information. This and other personal data is collected by WebTracker. To get an idea of the scope of work involved, you have decided to start reviewing the company's documentation and interviewing key staff to understand potential privacy risks. The results of this initial work include the following notes: There are several typos in the current privacy notice of WebTracker, and you were not able to find the privacy notice for SmartHome. You were unable to identify all the sub-processors working for SmartHome. No subcontractor is indicated in the cloud agreement with AmaZure, which is responsible for the support and maintenance of the cloud infrastructure. There are data flows representing personal data being collected from the internal employees of WebTracker, including an interface from the HR system. Part of the DNA data collected by WebTracker was from employees, as this was a prototype approved by the CEO of WebTracker. All the WebTracker and SmartHome customers are based in USA and Canada. Based on the initial assessment and review of the available data flows, which of the following would be the most important privacy risk you should investigate first?