IAPP CIPM Exam Practice Questions (P. 4)
- Full Access (275 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
Why were the nongovernmental privacy organizations, Electronic Frontier Foundation (EFF) and Electronic Privacy Information Center (EPIC), established?
- ATo promote consumer confidence in the Internet industry.
- BTo improve the user experience during online shopping.
- CTo protect civil liberties and raise consumer awareness.
- DTo promote security on the Internet through strong encryption.
Correct Answer:
C
C
send
light_mode
delete
Question #17
What is the main function of the Asia-Pacific Economic Cooperation Privacy Framework?
- AEnabling regional data transfers.Most Voted
- BProtecting data from parties outside the region.
- CEstablishing legal requirements for privacy protection in the region.
- DMarketing privacy protection technologies developed in the region.
Correct Answer:
A
A
send
light_mode
delete
Question #18
Which of the following is TRUE about the Data Protection Impact Assessment (DPIA) process as required under the General Data Protection Regulation (GDPR)?
- AThe DPIA result must be reported to the corresponding supervisory authority.
- BThe DPIA report must be published to demonstrate the transparency of the data processing.
- CThe DPIA must include a description of the proposed processing operation and its purpose.
- DThe DPIA is required if the processing activity entails risk to the rights and freedoms of an EU individual.
Correct Answer:
D
D
send
light_mode
delete
Question #19
As a Data Protection Officer (DPO), one of your roles entails monitoring changes in laws and regulations and updating policies accordingly.
How would you most effectively execute this responsibility?
How would you most effectively execute this responsibility?
- AConsult an external lawyer.
- BRegularly engage regulators.
- CAttend workshops and interact with other professionals.
- DSubscribe to email list-serves that report on regulatory changes.
Correct Answer:
D
D
send
light_mode
delete
Question #20
SCENARIO -
Please use the following to answer the next question:
John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe. During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.
John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe's previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.
At the meeting, Derrick emphasized that email is the primary method for the firm's lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn't have the time or resource to look for another solution. Furthermore, the off-premises email continuity service will only be turned on when the email service at A&M LLP's primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.
Which of the following is the most effective control to enforce MessageSafe's implementation of appropriate technical countermeasures to protect the personal data received from A&M LLP?
Please use the following to answer the next question:
John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe. During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.
John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe's previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.
At the meeting, Derrick emphasized that email is the primary method for the firm's lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn't have the time or resource to look for another solution. Furthermore, the off-premises email continuity service will only be turned on when the email service at A&M LLP's primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.
Which of the following is the most effective control to enforce MessageSafe's implementation of appropriate technical countermeasures to protect the personal data received from A&M LLP?
- AMessageSafe must apply due diligence before trusting Cloud Inc. with the personal data received from A&M LLP.
- BMessageSafe must flow-down its data protection contract terms with A&M LLP to Cloud Inc.
- CMessageSafe must apply appropriate security controls on the cloud infrastructure.
- DMessageSafe must notify A&M LLP of a data breach.Most Voted
Correct Answer:
D
D
send
light_mode
delete
All Pages