Pass4itsure > IAPP > IAPP Certifications > CIPT > CIPT Online Practice Questions and Answers

CIPT Online Practice Questions and Answers

Questions 4

What has been identified as a significant privacy concern with chatbots?

A. Most chatbot providers do not agree to code audits

B. Chatbots can easily verify the identity of the contact.

C. Users' conversations with chatbots are not encrypted in transit.

D. Chatbot technology providers may be able to read chatbot conversations with users.

Buy Now
Questions 5

Which is NOT a drawback to using a biometric recognition system?

A. It can require more maintenance and support.

B. It can be more expensive than other systems

C. It has limited compatibility across systems.

D. It is difficult for people to use.

Buy Now
Questions 6

SCENARIO

Please use the following to answer the next questions:

Your company is launching a new track and trace health app during the outbreak of a virus pandemic in the US. The developers claim the app is based on privacy by design because personal data collected was considered to ensure only necessary data is captured, users are presented with a privacy notice, and they are asked to give consent before data is shared. Users can update their consent after logging into an account, through a dedicated privacy and consent hub. This is accessible through the 'Settings' icon from any app page, then clicking 'My Preferences', and selecting 'Information Sharing and Consent' where the following choices are displayed:

1.

"I consent to receive notifications and infection alerts";

2.

"I consent to receive information on additional features or services, and new products";

3.

"I consent to sharing only my risk result and location information, for exposure and contact tracing purposes";

4.

"I consent to share my data for medical research purposes"; and

5.

"I consent to share my data with healthcare providers affiliated to the company".

For each choice, an ON* or OFF tab is available The default setting is ON for all

Users purchase a virus screening service for USS29 99 for themselves or others using the app The virus screening service works as follows:

1.

Step 1 A photo of the user's face is taken.

2.

Step 2 The user measures their temperature and adds the reading in the app

3.

Step 3 The user is asked to read sentences so that a voice analysis can detect symptoms

4.

Step 4 The user is asked to answer questions on known symptoms

5.

Step 5 The user can input information on family members (name date of birth, citizenship, home address, phone number, email and relationship).)

The results are displayed as one of the following risk status "Low. "Medium" or "High" if the user is deemed at "Medium " or "High" risk an alert may be sent to other users and the user is Invited to seek a medical consultation and diagnostic from a healthcare provider.

A user's risk status also feeds a world map for contact tracing purposes, where users are able to check if they have been or are in dose proximity of an infected person If a user has come in contact with another individual classified as "medium' or 'high' risk an instant notification also alerts the user of this. The app collects location trails of every user to monitor locations visited by an infected individual Location is collected using the phone's GPS functionary, whether the app is in use or not however, the exact location of the user is "blurred' for privacy reasons Users can only see on the map circles

Which of the following pieces of information collected is the LEAST likely to be justified tor the purposes of the app?

A. Relationship of family member

B. Phone number

C. Dale of birth

D. Citizenship

Buy Now
Questions 7

SCENARIO

Please use the following to answer the next question:

Jordan just joined a fitness-tracker start-up based in California, USA, as its first Information Privacy and Security Officer. The company is quickly growing its business but does not sell any of the fitness trackers itself. Instead, it relies on a distribution network of third-party retailers in all major countries. Despite not having any stores, the company has a 78% market share in the EU. It has a website presenting the company and products, and a member section where customers can access their information. Only the email address and physical address need to be provided as part of the registration process in order to customize the site to the user's region and country. There is also a newsletter sent every month to all members featuring fitness tips, nutrition advice, product spotlights from partner companies based on user behavior and preferences.

Jordan says the General Data Protection Regulation (GDPR) does not apply to the company. He says the company is not established in the EU, nor does it have a processor in the region. Furthermore, it does not do any "offering goods or services" in the EU since it does not do any marketing there, nor sell to consumers directly. Jordan argues that it is the customers who chose to buy the products on their own initiative and there is no "offering" from the company.

The fitness trackers incorporate advanced features such as sleep tracking, GPS tracking, heart rate monitoring. wireless syncing, calorie-counting and step-tracking. The watch must be paired with either a smartphone or a computer in order to collect data on sleep levels, heart rates, etc. All information from the device must be sent to the company's servers in order to be processed, and then the results are sent to the smartphone or computer. Jordan argues that there is no personal information involved since the company does not collect banking or social security information.

Based on the current features of the fitness watch, what would you recommend be implemented into each device in order to most effectively ensure privacy?

A. Hashing.

B. A2DP Bluetooth profile.

C. Persistent unique identifier.

D. Randomized MAC address.

Buy Now
Questions 8

What is the main reason the Do Not Track (DNT) header is not acknowledged by more companies?

A. Most web browsers incorporate the DNT feature.

B. The financial penalties for violating DNT guidelines are too high.

C. There is a lack of consensus about what the DNT header should mean.

D. It has been difficult to solve the technological challenges surrounding DNT.

Buy Now
Questions 9

Ivan is a nurse for a home healthcare service provider in the US. The company has implemented a mobile application which Ivan uses to record a patient's vital statistics and access a patient's health care records during home visits. During one visitj^van is unable to access the health care application to record the patient's vitals. He instead records the information on his mobile phone's note-taking application to enter the data in the health care application the next time it is accessible. What would be the best course of action by the IT department to ensure the data is protected on his device?

A. Provide all healthcare employees with mandatory annual security awareness training with a focus on the health information protection.

B. Complete a SWOT analysis exercise on the mobile application to identify what caused the application to be inaccessible and remediate any issues.

C. Adopt mobile platform standards to ensure that only mobile devices that support encryption capabilities are used.

D. Implement Mobile Device Management (MDM) to enforce company security policies and configuration settings.

Buy Now
Questions 10

What element is most conducive to fostering a sound privacy by design culture in an organization?

A. Ensuring all employees acknowledge and understood the privacy policy.

B. Frequent privacy and security awareness training for employees.

C. Monthly reviews of organizational privacy principles.

D. Gaining advocacy from senior management.

Buy Now
Questions 11

An individual drives to the grocery store for dinner. When she arrives at the store, she receives several unsolicited notifications on her phone about discounts on items at the grocery store she is about to shop at. Which type of privacy problem does the represent?

A. Intrusion.

B. Surveillance.

C. Decisional Interference.

D. Exposure.

Buy Now
Questions 12

How can a hacker gain control of a smartphone to perform remote audio and video surveillance?

A. By performing cross-site scripting.

B. By installing a roving bug on the phone.

C. By manipulating geographic information systems.

D. By accessing a phone's global positioning system satellite signal.

Buy Now
Questions 13

Which of the following methods does NOT contribute to keeping the data confidential?

A. Differential privacy.

B. Homomorphic encryption.

C. K-anonymity.

D. Referential integrity.

Buy Now
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist (CIPT)
Last Update: Apr 17, 2024
Questions: 214
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99