IAPP CIPT Certified Information Privacy Technologist Online Training
IAPP CIPT Online Training
The questions for CIPT were last updated at Nov 26,2024.
- Exam Code: CIPT
- Exam Name: Certified Information Privacy Technologist
- Certification Provider: IAPP
- Latest update: Nov 26,2024
Which is NOT a suitable method for assuring the quality of data collected by a third-party company?
- A . Verifying the accuracy of the data by contacting users.
- B . Validating the company’s data collection procedures.
- C . Introducing erroneous data to see if its detected.
- D . Tracking changes to data through auditing.
A valid argument against data minimization is that it?
- A . Can limit business opportunities.
- B . Decreases the speed of data transfers.
- C . Can have an adverse effect on data quality.
- D . Increases the chance that someone can be identifed from data.
What is the main reason a company relies on implied consent instead of explicit consent from a user to process her data?
- A . The implied consent model provides the user with more detailed data collection information.
- B . To secure explicit consent, a user’s website browsing would be signifcantly disrupted.
- C . An explicit consent model is more expensive to implement.
- D . Regulators prefer the implied consent model.
What is the main beneft of using dummy data during software testing?
- A . The data comes in a format convenient for testing.
- B . Statistical disclosure controls are applied to the data.
- C . The data enables the suppression of particular values in a set.
- D . Developers do not need special privacy training to test the software.
How does k-anonymity help to protect privacy in micro data sets?
- A . By ensuring that every record in a set is part of a group of "k" records having similar identifying information.
- B . By switching values between records in order to preserve most statistics while still maintaining privacy.
- C . By adding sufcient noise to the data in order to hide the impact of any one individual.
- D . By top-coding all age data above a value of "k."
Which of the following statements describes an acceptable disclosure practice?
- A . An organization’s privacy policy discloses how data will be used among groups within the organization itself.
- B . With regard to limitation of use, internal disclosure policies override contractual agreements with third parties.
- C . Intermediaries processing sensitive data on behalf of an organization require stricter disclosure oversight than vendors.
- D . When an organization discloses data to a vendor, the terms of the vendor’ privacy notice prevail over the organization’ privacy notice.
How should the sharing of information within an organization be documented?
- A . With a binding contract.
- B . With a data fow diagram.
- C . With a disclosure statement.
- D . With a memorandum of agreement.
What can be used to determine the type of data in storage without exposing its contents?
- A . Collection records.
- B . Data mapping.
- C . Server logs.
- D . Metadata.
What must be done to destroy data stored on "write once read many" (WORM) media?
- A . The data must be made inaccessible by encryption.
- B . The erase function must be used to remove all data.
- C . The media must be physically destroyed.
- D . The media must be reformatted.
Which of the following would best improve an organization’ s system of limiting data use?
- A . Implementing digital rights management technology.
- B . Confrming implied consent for any secondary use of data.
- C . Applying audit trails to resources to monitor company personnel.
- D . Instituting a system of user authentication for company personnel.