New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CIPT Exam Dumps - Certified Information Privacy Technologist

Go to page:
Question # 41

A valid argument against data minimization is that it?

A.

Can limit business opportunities.

B.

Decreases the speed of data transfers.

C.

Can have an adverse effect on data quality.

D.

Increases the chance that someone can be identified from data.

Full Access
Question # 42

Which is likely to reduce the types of access controls needed within an organization?

A.

Decentralization of data.

B.

Regular data inventories.

C.

Standardization of technology.

D.

Increased number of remote employees.

Full Access
Question # 43

Which of the following is an example of the privacy risks associated with the Internet of Things (loT)?

A.

A group of hackers infiltrate a power grid and cause a major blackout.

B.

An insurance company raises a person’s rates based on driving habits gathered from a connected car.

C.

A website stores a cookie on a user's hard drive so the website can recognize the user on subsequent visits.

D.

A water district fines an individual after a meter reading reveals excess water use during drought conditions.

Full Access
Question # 44

A healthcare provider would like to data mine information for research purposes however the Chief Privacy Officer is concerned medical data of individuals may be disclosed overcome the concern, which is the preferred technique for protecting such data while still allowing for analysis?

A.

Access Control

B.

Encryption

C.

Isolation

D.

Perturbation

Full Access
Question # 45

A user who owns a resource wants to give other individuals access to the resource. What control would apply?

A.

Mandatory access control.

B.

Role-based access controls.

C.

Discretionary access control.

D.

Context of authority controls.

Full Access
Question # 46

Users of a web-based email service have their accounts breached through compromised login credentials. Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?

A.

Financial loss and blackmail.

B.

Financial loss and solicitation.

C.

Identity theft and embarrassment.

D.

Identity theft and the leaking of information.

Full Access
Question # 47

What risk is mitigated when routing meeting video traffic through a company’s application servers rather than sending the video traffic directly from one user to another?

A.

The user's identity is protected from the other user

B.

The user is protected against cyberstalking attacks

C.

The user's IP address is hidden from the other user

D.

The user is assured that stronger authentication methods have been used

Full Access
Question # 48

An organization is launching a new smart speaker to the market. The device will have the capability to play music and provide news and weather updates. Which of the following would be a concern from a privacy perspective?

A.

Appropriation.

B.

Browser Fingerprinting.

C.

Context of authority.

D.

Context aware computing.

Full Access
Go to page: