New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIPT Exam Dumps - Certified Information Privacy Technologist

Go to page:
Question # 17

Which of the following functionalities can meet some of the General Data Protection Regulation’s (GDPR’s) Data Portability requirements for a social networking app designed for users in the EU?

A.

Allow users to modify the data they provided the app.

B.

Allow users to delete the content they provided the app.

C.

Allow users to download the content they have provided the app.

D.

Allow users to get a time-stamped list of what they have provided the app.

Full Access
Question # 18

An organization is considering launching enhancements to improve security and authentication mechanisms in their products. To better identify the user and reduce friction from the authentication process, they plan to track physical attributes of an individual. A privacy technologist assessing privacy implications would be most interested in which of the following?

A.

The purpose of the data tracking.

B.

That the individual is aware tracking is occurring.

C.

The authentication mechanism proposed.

D.

The encryption of individual physical attributes.

Full Access
Question # 19

In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?

A.

By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops.

B.

By increasing the size of neural networks and running massive amounts of data through the network to train it.

C.

By using algorithmic approaches such as decision tree learning and inductive logic programming.

D.

By hand coding software routines with a specific set of instructions to accomplish a task.

Full Access
Question # 20

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

The app is designed to collect and transmit geolocation data. How can data collection best be limited to the necessary minimum?

A.

Allow user to opt-out geolocation data collection at any time.

B.

Allow access and sharing of geolocation data only after an accident occurs.

C.

Present a clear and explicit explanation about need for the geolocation data.

D.

Obtain consent and capture geolocation data at all times after consent is received.

Full Access
Question # 21

Which activity would best support the principle of data quality?

A.

Providing notice to the data subject regarding any change in the purpose for collecting such data.

B.

Ensuring that the number of teams processing personal information is limited.

C.

Delivering information in a format that the data subject understands.

D.

Ensuring that information remains accurate.

Full Access
Question # 22

You are a wine collector who uses the web to do research about your hobby. You navigate to a news site and an ad for wine pops up. What kind of advertising is this?

A.

Remnant.

B.

Behavioral.

C.

Contextual.

D.

Demographic.

Full Access
Question # 23

Which of the following CANNOT be effectively determined during a code audit?

A.

Whether access control logic is recommended in all cases.

B.

Whether data is being incorrectly shared with a third-party.

C.

Whether consent is durably recorded in the case of a server crash.

D.

Whether the differential privacy implementation correctly anonymizes data.

Full Access
Question # 24

Properly configured databases and well-written website codes are the best protection against what online threat?

A.

Pharming.

B.

SQL injection.

C.

Malware execution.

D.

System modification.

Full Access
Go to page: