IAPP CIPT Exam Practice Questions (P. 3)
- Full Access (325 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
- AVerifying the accuracy of the data by contacting users.
- BValidating the company's data collection procedures.
- CIntroducing erroneous data to see if its detected.Most Voted
- DTracking changes to data through auditing.
send
light_mode
delete
Question #22
A valid argument against data minimization is that it?
- ACan limit business opportunities.
- BDecreases the speed of data transfers.
- CCan have an adverse effect on data quality.
- DIncreases the chance that someone can be identified from data.
Correct Answer:
A
A
send
light_mode
delete
Question #23
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
- AThe implied consent model provides the user with more detailed data collection information.
- BTo secure explicit consent, a user's website browsing would be significantly disrupted.
- CAn explicit consent model is more expensive to implement.
- DRegulators prefer the implied consent model.
send
light_mode
delete
Question #24
What is the main benefit of using dummy data during software testing?
- AThe data comes in a format convenient for testing.
- BStatistical disclosure controls are applied to the data.
- CThe data enables the suppression of particular values in a set.
- DDevelopers do not need special privacy training to test the software.
Correct Answer:
D
D
send
light_mode
delete
Question #25
How does k-anonymity help to protect privacy in micro data sets?
- ABy ensuring that every record in a set is part of a group of "k" records having similar identifying information.
- BBy switching values between records in order to preserve most statistics while still maintaining privacy.
- CBy adding sufficient noise to the data in order to hide the impact of any one individual.
- DBy top-coding all age data above a value of "k."
Correct Answer:
A
Reference:
https://www.researchgate.net/publication/284332229_k-Anonymity_A_Model_for_Protecting_Privacy
A
Reference:
https://www.researchgate.net/publication/284332229_k-Anonymity_A_Model_for_Protecting_Privacy
send
light_mode
delete
Question #26
Which of the following statements describes an acceptable disclosure practice?
- AAn organization's privacy policy discloses how data will be used among groups within the organization itself.
- BWith regard to limitation of use, internal disclosure policies override contractual agreements with third parties.
- CIntermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.
- DWhen an organization discloses data to a vendor, the terms of the vendor' privacy notice prevail over the organization' privacy notice.
Correct Answer:
A
A
send
light_mode
delete
Question #27
How should the sharing of information within an organization be documented?
- AWith a binding contract.
- BWith a data flow diagram.Most Voted
- CWith a disclosure statement.
- DWith a memorandum of agreement.
send
light_mode
delete
Question #28
What can be used to determine the type of data in storage without exposing its contents?
- ACollection records.
- BData mapping.
- CServer logs.
- DMetadata.
Correct Answer:
D
Reference:
https://cloud.google.com/storage/docs/gsutil/addlhelp/WorkingWithObjectMetadata
D
Reference:
https://cloud.google.com/storage/docs/gsutil/addlhelp/WorkingWithObjectMetadata
send
light_mode
delete
Question #29
What must be done to destroy data stored on "write once read many" (WORM) media?
- AThe data must be made inaccessible by encryption.
- BThe erase function must be used to remove all data.
- CThe media must be physically destroyed.
- DThe media must be reformatted.
Correct Answer:
C
C
send
light_mode
delete
Question #30
Which of the following would best improve an organization' s system of limiting data use?
- AImplementing digital rights management technology.
- BConfirming implied consent for any secondary use of data.
- CApplying audit trails to resources to monitor company personnel.
- DInstituting a system of user authentication for company personnel.Most Voted
Correct Answer:
C
C
send
light_mode
delete
All Pages