Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free IAPP CIPM Practice Exam with Questions & Answers | Set: 7

Questions 61

Why were the nongovernmental privacy organizations, Electronic Frontier Foundation (EFF) and Electronic Privacy Information Center (EPIC), established?

Options:
A.

To promote consumer confidence in the Internet industry.

B.

To improve the user experience during online shopping.

C.

To protect civil liberties and raise consumer awareness.

D.

To promote security on the Internet through strong encryption.

IAPP CIPM Premium Access
Questions 62

(From a privacy perspective, what is the first concern organizations must tackle when considering using a third-party AI tool to screen job applications?)

Options:
A.

Analyzing compliance with privacy laws and AI regulations.

B.

Preparing a notice for job applicants in advance of tool deployment.

C.

Assigning contractual responsibility in case of regulatory non-compliance.

D.

Identifying the most suitable vendor based on organizational requirements.

Questions 63

What is the main purpose in notifying data subjects of a data breach?

Options:
A.

To avoid financial penalties and legal liability.

B.

To enable regulators to understand trends and developments that may shape the law.

C.

To ensure organizations have accountability for the sufficiency of their security measures.

D.

To allow individuals to take any actions required to protect themselves from possible consequences.

Questions 64

Which item below best represents how a privacy group can effectively communicate with functional areas?

Options:
A.

Work independently and share the knowledge with functional groups.

B.

Work closely with functional areas by acting as both an advisor and an advocate.

C.

Choose a work unit representative and funnel all communications through that one person.

D.

Monitor the responsibilities of managers who are responsible for the privacy of functional areas.

Questions 65

In privacy protection, what is a "covered entity"?

Options:
A.

Personal data collected by a privacy organization.

B.

An organization subject to the privacy provisions of HIPAA.

C.

A privacy office or team fully responsible for protecting personal information.

D.

Hidden gaps in privacy protection that may go unnoticed without expert analysis.

Questions 66

SCENARIO

Please use the following to answer the next QUESTION:

Henry Home Furnishings has built high-end furniture for nearly forty years. However, the new owner, Anton, has found some degree of disorganization after touring the company headquarters. His uncle Henry had always focused on production – not data processing – and Anton is concerned. In several storage rooms, he has found paper files, disks, and old computers that appear to contain the personal data of current and former employees and customers. Anton knows that a single break-in could irrevocably damage the company's relationship with its loyal customers. He intends to set a goal of guaranteed zero loss of personal information.

To this end, Anton originally planned to place restrictions on who was admitted to the physical premises of the company. However, Kenneth – his uncle's vice president and longtime confidante – wants to hold off on Anton's idea in favor of converting any paper records held at the company to electronic storage. Kenneth believes this process would only take one or two years. Anton likes this idea; he envisions a password- protected system that only he and Kenneth can access.

Anton also plans to divest the company of most of its subsidiaries. Not only will this make his job easier, but it will simplify the management of the stored data. The heads of subsidiaries like the art gallery and kitchenware store down the street will be responsible for their own information management. Then, any unneeded subsidiary data still in Anton's possession can be destroyed within the next few years.

After learning of a recent security incident, Anton realizes that another crucial step will be notifying customers. Kenneth insists that two lost hard drives in Question are not cause for concern; all of the data was encrypted and not sensitive in nature. Anton does not want to take any chances, however. He intends on sending notice letters to all employees and customers to be safe.

Anton must also check for compliance with all legislative, regulatory, and market requirements related to privacy protection. Kenneth oversaw the development of the company's online presence about ten years ago, but Anton is not confident about his understanding of recent online marketing laws. Anton is assigning another trusted employee with a law background the task of the compliance assessment. After a thorough analysis, Anton knows the company should be safe for another five years, at which time he can order another check.

Documentation of this analysis will show auditors due diligence.

Anton has started down a long road toward improved management of the company, but he knows the effort is worth it. Anton wants his uncle's legacy to continue for many years to come.

To improve the facility's system of data security, Anton should consider following through with the plan for which of the following?

Options:
A.

Customer communication.

B.

Employee access to electronic storage.

C.

Employee advisement regarding legal matters.

D.

Controlled access at the company headquarters.

Questions 67

All of the following would be recommended for effective identity access management (IAM) EXCEPT?

Options:
A.

User responsibility.

B.

Demographics.

C.

Biometrics.

D.

Credentials.

Questions 68

(What can you do from a control perspective that is most likely to mitigate the risks in how data is transferred to customers?)

Options:
A.

Implement a method of data transfer for the files containing sensitive personal information with end-to-end encryption.

B.

Specify in the customer contract that only an authorized end user is allowed to open files.

C.

Allow employees to use their personal email to send files exclusively under emergency circumstances.

D.

Keep a secure audit log of files with sensitive personal data sent to the customer including the intended recipient, and audit on a quarterly basis.

Questions 69

A "right to erasure" request could be rejected if the processing of personal data is for?

Options:
A.

An outdated original purpose.

B.

Compliance with legal obligation.

C.

The offer of information society services.

D.

The establishment of personal legal claims.

Questions 70

What is the key privacy objective in undertaking an evaluation of technical controls?

Options:
A.

To review and evaluate gaps in targeted internal privacy awareness training.

B.

To determine if the current privacy framework is adequate for the company's needs.

C.

To evaluate and mitigate third-party risk associated with service provider relationships.

D.

To identify and mitigate privacy risks associated with technical systems and data processing activities.