This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ] Export date:Fri Nov 15 20:52:28 2024 / +0000 GMT ___________________________________________________ Title: CIPT Premium Files Updated May-2023 Practice Valid Exam Dumps Question [Q19-Q35] --------------------------------------------------- CIPT Premium Files Updated May-2023 Practice Valid Exam Dumps Question Practice with CIPT Dumps for Information Privacy Technologist Certified Exam Questions & Answer QUESTION 19SCENARIOPlease use the following to answer the next question:Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.What is the most secure method Finley Motors should use to transmit Chuck’s information to AMP Payment Resources?  Cloud file transfer services.  Certificate Authority (CA).  HyperText Transfer Protocol (HTTP).  Transport Layer Security (TLS). QUESTION 20What is the distinguishing feature of asymmetric encryption?  It has a stronger key for encryption than for decryption.  It employs layered encryption using dissimilar methods.  It uses distinct keys for encryption and decryption.  It is designed to cross operating systems. QUESTION 21SCENARIOPlease use the following to answer the next question:Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne’s Regional Medical Center in Thorn Bay, Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center?  Symmetric Encryption  Tokenization  Obfuscation  Certificates QUESTION 22SCENARIOPlease use the following to answer the next question:Chuck, a compliance auditor for a consulting firm focusing on healthcare clients, was required to travel to the client’s office to perform an onsite review of the client’s operations. He rented a car from Finley Motors upon arrival at the airport as so he could commute to and from the client’s office. The car rental agreement was electronically signed by Chuck and included his name, address, driver’s license, make/model of the car, billing rate, and additional details describing the rental transaction. On the second night, Chuck was caught by a red light camera not stopping at an intersection on his way to dinner. Chuck returned the car back to the car rental agency at the end week without mentioning the infraction and Finley Motors emailed a copy of the final receipt to the address on file.Local law enforcement later reviewed the red light camera footage. As Finley Motors is the registered owner of the car, a notice was sent to them indicating the infraction and fine incurred. This notice included the license plate number, occurrence date and time, a photograph of the driver, and a web portal link to a video clip of the violation for further review. Finley Motors, however, was not responsible for the violation as they were not driving the car at the time and transferred the incident to AMP Payment Resources for further review. AMP Payment Resources identified Chuck as the driver based on the rental agreement he signed when picking up the car and then contacted Chuck directly through a written letter regarding the infraction to collect the fine.After reviewing the incident through the AMP Payment Resources’ web portal, Chuck paid the fine using his personal credit card. Two weeks later, Finley Motors sent Chuck an email promotion offering 10% off a future rental.What is the strongest method for authenticating Chuck’s identity prior to allowing access to his violation information through the AMP Payment Resources web portal?  By requiring Chuck use the last 4 digits of his driver’s license number in combination with a unique PIN provided within the violation notice.  By requiring Chuck use his credit card number in combination with the last 4 digits of his driver’s license.  By requiring Chuck use the rental agreement number in combination with his email address.  By requiring Chuck to call AMP Payment Resources directly and provide his date of birth and home address. QUESTION 23What must be done to destroy data stored on “write once read many” (WORM) media?  The data must be made inaccessible by encryption.  The erase function must be used to remove all data.  The media must be physically destroyed.  The media must be reformatted. QUESTION 24How should the sharing of information within an organization be documented?  With a binding contract.  With a data flow diagram.  With a disclosure statement.  With a memorandum of agreement. QUESTION 25What is a mistake organizations make when establishing privacy settings during the development of applications?  Providing a user with too many choices.  Failing to use “Do Not Track” technology.  Providing a user with too much third-party information.  Failing to get explicit consent from a user on the use of cookies. QUESTION 26SCENARIO – Please use the following to answer the next question:Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephor, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database – currently managed in-house by Clean-Q IT Support. Because of Clean-Q:s business.model, resources are contracted as needed instead of permanently employed.The table below indicates some of the personal information Clean-Q requires as part of its business operations:Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation.Therefore, the Clean-Q permanent employee base is not included as part of this scenario.With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q:s traditional supply and demand system that has caused some overlapping bookings.In a business statrategy session held by senior management recently, Clearning invited vendors to present potential solutions to their current operational issues. These vendors includes included Application development and Cloud solution providers, presenting their proposed solution and platforms.The Managing Direct opted to initiate the process to integrate Clean-Q’s operations with a cloud solution (LeadOps) that will provide the following solution one single online platform. A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.A resource facing web interface that enables resources to apply and manage their assigned jobs.An online payment facility for customer to pay for services.Which question would you most likely ask to gain more insight about LeadOps and provide practical privacy recommendations?  What is LeadOps annual turnover?  How big is LeadOps employee base?  Where are LeadOps operations and hosting services located?  Does LeadOps practice agile development and maintenance of their system? QUESTION 27SCENARIOClean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database – currently managed in-house by Clean-Q IT Support. Because of Clean-Q’s business model, resources are contracted as needed instead of permanently employed.The table below indicates some of the personal information Clean-Q requires as part of its business operations:Clean-Q has an internal employee base of about 30 people. A recent privacy compliance exercise has been conducted to align employee data management and human resource functions with applicable data protection regulation. Therefore, the Clean-Q permanent employee base is not included as part of this scenario.With an increase in construction work and housing developments, Clean-Q has had an influx of requests for cleaning services. The demand has overwhelmed Clean-Q’s traditional supply and demand system that has caused some overlapping bookings.Ina business strategy session held by senior management recently, Clear-Q invited vendors to present potential solutions to their current operational issues. These vendors included Application developers and Cloud-Q’s solution providers, presenting their proposed solutions and platforms.The Managing Director opted to initiate the process to integrate Clean-Q’s operations with a cloud solution (LeadOps) that will provide the following solution one single online platform: A web interface that Clean-Q accesses for the purposes of resource and customer management. This would entail uploading resource and customer information.* A customer facing web interface that enables customers to register, manage and submit cleaning service requests online.* A resource facing web interface that enables resources to apply and manage their assigned jobs.* An online payment facility for customers to pay for services.Which question would you most likely ask to gain more insight about LeadOps and provide practical privacy recommendations?  What is LeadOps’ annual turnover?  How big is LeadOps’ employee base?  Where are LeadOps’ operations and hosting services located?  Does LeadOps practice agile development and maintenance of their system? QUESTION 28SCENARIOWesley Energy has finally made its move, acquiring the venerable oil and gas exploration firm Lancelot from its long-time owner David Wilson. As a member of the transition team, you have come to realize that Wilson’s quirky nature affected even Lancelot’s data practices, which are maddeningly inconsistent. “The old man hired and fired IT people like he was changing his necktie,” one of Wilson’s seasoned lieutenants tells you, as you identify the traces of initiatives left half complete.For instance, while some proprietary data and personal information on clients and employees is encrypted, other sensitive information, including health information from surveillance testing of employees for toxic exposures, remains unencrypted, particularly when included within longer records with less-sensitive data.You also find that data is scattered across applications, servers and facilities in a manner that at first glance seems almost random.Among your preliminary findings of the condition of data at Lancelot are the following:* Cloud technology is supplied by vendors around the world, including firms that you have not heard of.You are told by a former Lancelot employee that these vendors operate with divergent security requirements and protocols.* The company’s proprietary recovery process for shale oil is stored on servers among a variety of less-sensitive information that can be accessed not only by scientists, but by personnel of all types at most company locations.* DES is the strongest encryption algorithm currently used for any file.* Several company facilities lack physical security controls, beyond visitor check-in, which familiar vendors often bypass.* Fixing all of this will take work, but first you need to grasp the scope of the mess and formulate a plan of action to address it.Which is true regarding the type of encryption Lancelot uses?  It employs the data scrambling technique known as obfuscation.  Its decryption key is derived from its encryption key.  It uses a single key for encryption and decryption.  It is a data masking methodology. QUESTION 29SCENARIOKyle is a new security compliance manager who will be responsible for coordinating and executing controls to ensure compliance with the company’s information security policy and industry standards. Kyle is also new to the company, where collaboration is a core value. On his first day of new-hire orientation, Kyle’s schedule included participating in meetings and observing work in the IT and compliance departments.Kyle spent the morning in the IT department, where the CIO welcomed him and explained that her department was responsible for IT governance. The CIO and Kyle engaged in a conversation about the importance of identifying meaningful IT governance metrics. Following their conversation, the CIO introduced Kyle to Ted and Barney. Ted is implementing a plan to encrypt data at the transportation level of the organization’s wireless network. Kyle would need to get up to speed on the project and suggest ways to monitor effectiveness once the implementation was complete. Barney explained that his short-term goals are to establish rules governing where data can be placed and to minimize the use of offline data storage.Kyle spent the afternoon with Jill, a compliance specialist, and learned that she was exploring an initiative for a compliance program to follow self-regulatory privacy principles. Thanks to a recent internship, Kyle had some experience in this area and knew where Jill could find some support. Jill also shared results of the company’s privacy risk assessment, noting that the secondary use of personal information was considered a high risk.By the end of the day, Kyle was very excited about his new job and his new company. In fact, he learned about an open position for someone with strong qualifications and experience with access privileges, project standards board approval processes, and application-level obligations, and couldn’t wait to recommend his friend Ben who would be perfect for the job.Which data practice is Barney most likely focused on improving?  Deletion  Inventory.  Retention.  Sharing QUESTION 30A sensitive biometrics authentication system is particularly susceptible to?  False positives.  False negatives.  Slow recognition speeds.  Theft of finely individualized personal data. QUESTION 31SCENARIOYou have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endless. As the CEO likes to say, Ancillary offers, without doubt, the widest assortment of low-price consumer products from a single company anywhere.Ancillary’s operations are similarly diverse. The company originated with a team of sales consultants selling home and beauty products at small parties in the homes of customers, and this base business is still thriving.However, the company now sells online through retail sites designated for industries and demographics, sites such as “My Cool Ride” for automobile-related products or “Zoomer” for gear aimed toward young adults.The company organization includes a plethora of divisions, units and outrigger operations, as Ancillary has been built along a decentered model rewarding individual initiative and flexibility, while also acquiring key assets. The retail sites seem to all function differently, and you wonder about their compliance with regulations and industry standards. Providing tech support to these sites is also a challenge, partly due to a variety of logins and authentication protocols.You have been asked to lead three important new projects at Ancillary:The first is the personal data management and security component of a multi-faceted initiative to unify the company’s culture. For this project, you are considering using a series of third- party servers to provide company data and approved applications to employees.The second project involves providing point of sales technology for the home sales force, allowing them to move beyond paper checks and manual credit card imprinting.Finally, you are charged with developing privacy protections for a single web store housing all the company’s product lines as well as products from affiliates. This new omnibus site will be known, aptly, as “Under the Sun.” The Director of Marketing wants the site not only to sell Ancillary’s products, but to link to additional products from other retailers through paid advertisements. You need to brief the executive team of security concerns posed by this approach.If you are asked to advise on privacy concerns regarding paid advertisements, which is the most important aspect to cover?  Unseen web beacons that combine information on multiple users.  Latent keys that trigger malware when an advertisement is selected.  Personal information collected by cookies linked to the advertising network.  Sensitive information from Structured Query Language (SQL) commands that may be exposed. QUESTION 32When releasing aggregates, what must be performed to magnitude data to ensure privacy?  Value swapping.  Noise addition.  Basic rounding.  Top coding. QUESTION 33In day to day interactions with technology, consumers are presented with privacy choices. Which of the following best represents the Privacy by Design (PbD) methodology of letting the user choose a non-zero-sum choice?  Using images, words, and contexts to elicit positive feelings that result in proactive behavior, thus eliminating negativity and biases.  Providing plain-language design choices that elicit privacy-related responses, helping users avoid errors and minimize the negative consequences of errors when they do occur.  Displaying the percentage of users that chose a particular option, thus enabling the user to choose the most preferred option.  Using contexts, antecedent events, and other priming concepts to assist the user in making a better privacy choice. QUESTION 34Which activity would best support the principle of data quality?  Providing notice to the data subject regarding any change in the purpose for collecting such data.  Ensuring that the number of teams processing personal information is limited.  Delivering information in a format that the data subject understands.  Ensuring that information remains accurate. ExplanationExplanation/Reference: https://iapp.org/resources/article/fair-information-practices/QUESTION 35What Privacy by Design (PbD) element should include a de-identification or deletion plan?  Categorization.  Remediation.  Retention.  Security  Loading … REAL CIPT Exam Questions With 100% Refund Guarantee : https://www.actualtests4sure.com/CIPT-test-questions.html --------------------------------------------------- Images: https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-05-09 16:46:26 Post date GMT: 2023-05-09 16:46:26 Post modified date: 2023-05-09 16:46:26 Post modified date GMT: 2023-05-09 16:46:26