Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the IAPP Information Privacy Technologist CIPT Questions and answers with ValidTests

Exam CIPT All Questions
Exam CIPT Premium Access

View all detail and faqs for the CIPT exam

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

Ivan is a nurse for a home healthcare service provider in the US. The company has implemented a mobile application which Ivan uses to record a patient's vital statistics and access a patient's health care records during home visits. During one visitj^van is unable to access the health care application to record the patient's vitals. He instead records the information on his mobile phone's note-taking application to enter the data in the health care application the next time it is accessible. What would be the best course of action by the IT department to ensure the data is protected on his device?

Options:

A.

Provide all healthcare employees with mandatory annual security awareness training with a focus on the health

information protection.

B.

Complete a SWOT analysis exercise on the mobile application to identify what caused the application to be

inaccessible and remediate any issues.

C.

Adopt mobile platform standards to ensure that only mobile devices that support encryption capabilities are used.

D.

Implement Mobile Device Management (MDM) to enforce company security policies and configuration settings.

Expert Solution
Questions # 42:

What is an Access Control List?

Options:

A.

A list of steps necessary for an individual to access a resource.

B.

A list that indicates the type of permission granted to each individual.

C.

A list showing the resources that an individual has permission to access.

D.

A list of individuals who have had their access privileges to a resource revoked.

Expert Solution
Questions # 43:

Which of the following is considered a records management best practice?

Options:

A.

Archiving expired data records and files.

B.

Storing decryption keys with their associated backup systems.

C.

Implementing consistent handling practices across all record types.

D.

Using classification to determine access rules and retention policy.

Expert Solution
Questions # 44:

Which of the following statements best describes the relationship between privacy and security?

Options:

A.

Security systems can be used to enforce compliance with privacy policies.

B.

Privacy and security are independent; organizations must decide which should by emphasized.

C.

Privacy restricts access to personal information; security regulates how information should be used.

D.

Privacy protects data from being viewed during collection and security governs how collected data should be shared.

Expert Solution
Questions # 45:

Which of the following is a privacy consideration for NOT sending large-scale SPAM type emails to a database of email addresses?

Options:

A.

Poor user experience.

B.

Emails are unsolicited.

C.

Data breach notification.

D.

Reduction in email deliverability score.

Expert Solution
Questions # 46:

What distinguishes a "smart" device?

Options:

A.

It can perform multiple data functions simultaneously.

B.

It is programmable by a user without specialized training.

C.

It can reapply access controls stored in its internal memory.

D.

It augments its intelligence with information from the internet.

Expert Solution
Questions # 47:

How should the sharing of information within an organization be documented?

Options:

A.

With a binding contract.

B.

With a data flow diagram.

C.

With a disclosure statement.

D.

With a memorandum of agreement.

Expert Solution
Questions # 48:

What can be used to determine the type of data in storage without exposing its contents?

Options:

A.

Collection records.

B.

Data mapping.

C.

Server logs.

D.

Metadata.

Expert Solution
Questions # 49:

How does k-anonymity help to protect privacy in micro data sets?

Options:

A.

By ensuring that every record in a set is part of a group of "k" records having similar identifying information.

B.

By switching values between records in order to preserve most statistics while still maintaining privacy.

C.

By adding sufficient noise to the data in order to hide the impact of any one individual.

D.

By top-coding all age data above a value of "k."

Expert Solution
Questions # 50:

Properly configured databases and well-written website codes are the best protection against what online threat?

Options:

A.

Pharming.

B.

SQL injection.

C.

Malware execution.

D.

System modification.

Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions