Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Last Attempt CIPT Questions

Page: 7 / 8
Total 214 questions

Certified Information Privacy Technologist (CIPT) Questions and Answers

Question 25

When releasing aggregates, what must be performed to magnitude data to ensure privacy?

Options:

A.

Value swapping.

B.

Noise addition.

C.

Basic rounding.

D.

Top coding.

Question 26

A jurisdiction requiring an organization to place a link on the website that allows a consumer to opt-out of sharing is an example of what type of requirement?

Options:

A.

Functional

B.

Operational

C.

Technical

D.

Use case

Question 27

Users of a web-based email service have their accounts breached through compromised login credentials. Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?

Options:

A.

Financial loss and blackmail.

B.

Financial loss and solicitation.

C.

Identity theft and embarrassment.

D.

Identity theft and the leaking of information.

Question 28

Which of the following statements best describes the relationship between privacy and security?

Options:

A.

Security systems can be used to enforce compliance with privacy policies.

B.

Privacy and security are independent; organizations must decide which should by emphasized.

C.

Privacy restricts access to personal information; security regulates how information should be used.

D.

Privacy protects data from being viewed during collection and security governs how collected data should be shared.

Page: 7 / 8
Total 214 questions