Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Certified Information Privacy Manager CIPM Syllabus Exam Questions Answers

Page: 6 / 21
Total 274 questions

Certified Information Privacy Manager (CIPM) Questions and Answers

Question 21

All of the following would address your concern of the copy room EXCEPT?

Options:

A.

Placing a paper shredder in the copy room.

B.

Initiating a PIA.

C.

Hanging a poster reminding users to shred paper.

D.

Implementing a new paper record destruction policy.

Question 22

(Which of the following should be your first step when conducting an internal privacy audit focused on identifying cross-border data transfers in cloud environments?)

Options:

A.

Map the data and the locations where it is processed.

B.

Review the data inventory.

C.

Enable encryption of the data in transit by default.

D.

Review the list of the cloud providers and their location.

Question 23

If done correctly, how can a Data Protection Impact Assessment (DPIA) create a win/win scenario for organizations and individuals?

Options:

A.

By quickly identifying potentially problematic data attributes and reducing the risk exposure.

B.

By allowing Data Controllers to solicit feedback from individuals about how they feel about the potential data processing.

C.

By enabling Data Controllers to be proactive in their analysis of processing activities and ensuring compliance with the law.

D.

By better informing about the risks associated with the processing activity and improving the organization's transparency with individuals.

Question 24

SCENARIO

Please use the following to answer the next QUESTION:

Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.

One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.

Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.

Going forward, what is the best way for IgNight to prepare its IT team to manage these kind of security events?

Options:

A.

Tabletop exercises.

B.

Update its data inventory.

C.

IT security awareness training.

D.

Share communications relating to scheduled maintenance.

Page: 6 / 21
Total 274 questions