Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free IAPP CIPT Practice Exam with Questions & Answers | Set: 2

Questions 11

SCENARIO

Please use the following to answer the next question:

Light Blue Health (LBH) is a healthcare technology company developing a new web and mobile application that collects personal health information from electronic patient health records. The application will use machine learning to recommend potential medical treatments and medications based on information collected from anonymized electronic health records. Patient users may also share health data collected from other mobile apps with the LBH app.

The application requires consent from the patient before importing electronic health records into the application and sharing it with their authorized physicians or healthcare provider. The patient can then review and share the recommended treatments with their physicians securely through the app. The patient user may also share location data and upload photos in the app. The patient user may also share location data and upload photos in the app for a healthcare provider to review along with the health record. The patient may also delegate access to the app.

LBH’s privacy team meets with the Application development and Security teams, as well as key business stakeholders on a periodic basis. LBH also implements Privacy by Design (PbD) into the application development process.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) to evaluate privacy risks during development of the application. The team must assess whether the application is collecting descriptive, demographic or any other user related data from the electronic health records that are not needed for the purposes of the application. The team is also reviewing whether the application may collect additional personal data for purposes for which the user did not provide consent.

The Privacy Team is conducting a Privacy Impact Assessment (PIA) for the new Light Blue Health application currently in development. Which of the following best describes a risk that is likely to result in a privacy breach?

Options:
A.

Limiting access to the app to authorized personnel.

B.

Including non-transparent policies, terms and conditions in the app.

C.

Insufficiently deleting personal data after an account reaches its retention period.

D.

Not encrypting the health record when it is transferred to the Light Blue Health servers.

IAPP CIPT Premium Access
Questions 12

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

Options:
A.

Most web browsers incorporate the DNT feature.

B.

The financial penalties for violating DNT guidelines are too high.

C.

There is a lack of consensus about what the DNT header should mean.

D.

It has been difficult to solve the technological challenges surrounding DNT.

Questions 13

Which of the following provides a mechanism that allows an end-user to use a single sign-on (SSO) for multiple services?

Options:
A.

The Open ID Federation.

B.

PCI Data Security Standards Council

C.

International Organization for Standardization.

D.

Personal Information Protection and Electronic Documents Act.

Questions 14

Under the Family Educational Rights and Privacy Act (FERPA), releasing personally identifiable information from a student's educational record requires written permission from the parent or eligible student in order for information to be?

Options:
A.

Released to a prospective employer.

B.

Released to schools to which a student is transferring.

C.

Released to specific individuals for audit or evaluation purposes.

D.

Released in response to a judicial order or lawfully ordered subpoena.

Questions 15

An organization must terminate their cloud vendor agreement immediately. What is the most secure way to delete the encrypted data stored in the cloud?

Options:
A.

Transfer the data to another location.

B.

Invoke the appropriate deletion clause in the cloud terms and conditions.

C.

Obtain a destruction certificate from the cloud vendor.

D.

Destroy all encryption keys associated with the data.

Questions 16

A jurisdiction requiring an organization to place a link on the website that allows a consumer to opt-out of sharing is an example of what type of requirement?

Options:
A.

Functional

B.

Operational

C.

Technical

D.

Use case

Questions 17

After committing to a Privacy by Design program, which activity should take place first?

Options:
A.

Create a privacy standard that applies to all projects and services.

B.

Establish a retention policy for all data being collected.

C.

Implement easy to use privacy settings for users.

D.

Perform privacy reviews on new projects.

Questions 18

Which activity should the privacy technologist undertake to reduce potential privacy risk when evaluating options to process data in a country other than where it would be collected? ^

Options:
A.

Review the Data Life Cycle.

B.

Review data retention policies.

C.

Create enterprise data flow diagrams.

D.

Recommend controls for data transfers.

Questions 19

Ivan is a nurse for a home healthcare service provider in the US. The company has implemented a mobile application which Ivan uses to record a patient's vital statistics and access a patient's health care records during home visits. During one visitj^van is unable to access the health care application to record the patient's vitals. He instead records the information on his mobile phone's note-taking application to enter the data in the health care application the next time it is accessible. What would be the best course of action by the IT department to ensure the data is protected on his device?

Options:
A.

Provide all healthcare employees with mandatory annual security awareness training with a focus on the health

information protection.

B.

Complete a SWOT analysis exercise on the mobile application to identify what caused the application to be

inaccessible and remediate any issues.

C.

Adopt mobile platform standards to ensure that only mobile devices that support encryption capabilities are used.

D.

Implement Mobile Device Management (MDM) to enforce company security policies and configuration settings.

Questions 20

Which of the following activities would be considered the best method for an organization to achieve the privacy principle of data quality'?

Options:
A.

Clash customer information with information from a data broker

B.

Build a system with user access controls and approval workflows to edit customer data

C.

Set a privacy notice covering the purpose for collection of a customer's data

D.

Provide a customer with a copy of their data in a machine-readable format