Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free IAPP CIPT Practice Exam with Questions & Answers | Set: 5

Questions 41

Which concept related to privacy choice is demonstrated by highlighting and bolding the "accept" button on a cookies notice while maintaining standard text format for other options?

Options:
A.

Illuminating

B.

Nudging

C.

Suppression

D.

Tagging

IAPP CIPT Premium Access
Questions 42

To meet data protection and privacy legal requirements that may require personal data to be disposed of or deleted when no longer necessary for the use it was collected, what is the best privacy-enhancing solution a privacy technologist should recommend be implemented in application design to meet this requirement?

Options:
A.

Implement a process to delete personal data on demand and maintain records on deletion requests.

B.

Implement automated deletion of off-site backup of personal data based on annual risk assessments.

C.

Develop application logic to validate and purge personal data according to legal hold status or retention schedule.

D.

Securely archive personal data not accessed or used in the last 6 months. Automate a quarterly review to delete data

from archive once no longer needed.

Questions 43

Which of the following is an example of an appropriation harm?

Options:
A.

A friend takes and uploads your pictures to a social media website.

B.

A hacker gains access to your email account and reads your messages.

C.

A govemment agency uses cameras to monitor your movements in a public area.

D.

An unauthorized individual obtains access to your personal information and uses it for medical fraud.

Questions 44

What was the first privacy framework to be developed?

Options:
A.

OECD Privacy Principles.

B.

Generally Accepted Privacy Principles.

C.

Code of Fair Information Practice Principles (FIPPs).

D.

The Asia-Pacific Economic Cooperation (APEC) Privacy Framework.

Questions 45

Which of the following is one of the fundamental principles of information security?

Options:
A.

Accountability.

B.

Accessibility.

C.

Confidentiality.

D.

Connectivity.

Questions 46

Which of the following is the best method to minimize tracking through the use of cookies?

Options:
A.

Use ‘private browsing’ mode and delete checked files, clear cookies and cache once a day.

B.

Install a commercially available third-party application on top of the browser that is already installed.

C.

Install and use a web browser that is advertised as ‘built specifically to safeguard user privacy’.

D.

Manage settings in the browser to limit the use of cookies and remove them once the session completes.

Questions 47

Aadhaar is a unique-identity number of 12 digits issued to all Indian residents based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India. The Aadhaar database contains the Aadhaar number, name, date of birth, gender and address of over 1 billion individuals.

Which of the following datasets derived from that data would be considered the most de-identified?

Options:
A.

A count of the years of birth and hash of the person’ s gender.

B.

A count of the month of birth and hash of the person's first name.

C.

A count of the day of birth and hash of the person’s first initial of their first name.

D.

Account of the century of birth and hash of the last 3 digits of the person's Aadhaar number.

Questions 48

A valid argument against data minimization is that it?

Options:
A.

Can limit business opportunities.

B.

Decreases the speed of data transfers.

C.

Can have an adverse effect on data quality.

D.

Increases the chance that someone can be identified from data.

Questions 49

What is an example of a just-in-time notice?

Options:
A.

A warning that a website may be unsafe.

B.

A full organizational privacy notice publicly available on a website

C.

A credit card company calling a user to verify a purchase before itis authorized

D.

Privacy information given to a user when he attempts to comment on an online article.

Questions 50

Data oriented strategies Include which of the following?

Options:
A.

Minimize. Separate, Abstract, Hide.

B.

Inform, Control, Enforce, Demonstrate.

C.

Encryption, Hashing, Obfuscation, Randomization.

D.

Consent. Contract, Legal Obligation, Legitimate interests.