How can a hacker gain control of a smartphone to perform remote audio and video surveillance?
A. By performing cross-site scripting.
B. By installing a roving bug on the phone.
C. By manipulating geographic information systems.
D. By accessing a phone's global positioning system satellite signal.
Which of the following is NOT a step in the methodology of a privacy risk framework?
A. Assessment.
B. Monitoring.
C. Response.
D. Ranking.
In order to prevent others from identifying an individual within a data set, privacy engineers use a cryptographically-secure hashing algorithm. Use of hashes in this way illustrates the privacy tactic known as what?
A. Isolation.
B. Obfuscation.
C. Perturbation.
D. Stripping.
Which activity would best support the principle of data quality?
A. Providing notice to the data subject regarding any change in the purpose for collecting such data.
B. Ensuring that the number of teams processing personal information is limited.
C. Delivering information in a format that the data subject understands.
D. Ensuring that information remains accurate.
In terms of data extraction, which of the following should NOT be considered by a privacy technologist in relation to data portability?
A. The size of the data.
B. The format of the data.
C. The range of the data.
D. The medium of the data.
A user who owns a resource wants to give other individuals access to the resource. What control would apply?
A. Mandatory access control.
B. Role-based access controls.
C. Discretionary access control.
D. Context of authority controls.
A computer user navigates to a page on the Internet. The privacy notice pops up and the user clicks the box to accept cookies, then continues to scroll the page to read the Information displayed. This is an example of which type of consent?
A. Explicit.
B. Implicit.
C. Specific
D. Valid.
Which of the following would be the best method of ensuring that Information Technology projects follow Privacy by Design (PbD) principles?
A. Develop a technical privacy framework that integrates with the development lifecycle.
B. Utilize Privacy Enhancing Technologies (PETs) as a part of product risk assessment and management.
C. Identify the privacy requirements as a part of the Privacy Impact Assessment (PIA) process during development and evaluation stages.
D. Develop training programs that aid the developers in understanding how to turn privacy requirements into actionable code and design level specifications.
How does browser fingerprinting compromise privacy?
A. By creating a security vulnerability.
B. By differentiating users based upon parameters.
C. By persuading users to provide personal information.
D. By customizing advertising based on the geographic location.
What is a main benefit of data aggregation?
A. It is a good way to perform analysis without needing a statistician.
B. It applies two or more layers of protection to a single data record.
C. It allows one to draw valid conclusions from small data samples.
D. It is a good way to achieve de-identification and unlinkabilty.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IAPP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CIPT exam preparations and IAPP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.