Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Certified Information Privacy Technologist

Last Update 19 hours ago Total Questions : 220

The Certified Information Privacy Technologist content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include CIPT practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CIPT exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CIPT sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Privacy Technologist practice test comfortably within the allotted time.

Question # 4

SCENARIO

Please use the following to answer next question:

EnsureClaim is developing a mobile app platform for managing data used for assessing car accident insurance claims. Individuals use the app to take pictures at the crash site, eliminating the need for a built-in vehicle camera. EnsureClaim uses a third-party hosting provider to store data collected by the app. EnsureClaim customer service employees also receive and review app data before sharing with insurance claim adjusters.

The app collects the following information:

First and last name

Date of birth (DOB)

Mailing address

Email address

Car VIN number

Car model

License plate

Insurance card number

Photo

Vehicle diagnostics

Geolocation

All of the following technical measures can be implemented by EnsureClaim to protect personal information that is accessible by third-parties EXCEPT?

A.

Encryption.

B.

Access Controls.

C.

De-identification.

D.

Multi-factor authentication.

Question # 5

UESTION NO: 48

Which is NOT a drawback to using a biometric recognition system?

A.

It can require more maintenance and support.

B.

It can be more expensive than other systems

C.

It has limited compatibility across systems.

D.

It is difficult for people to use.

Question # 6

Which of the following can be used to bypass even the best physical and logical security mechanisms to gain access to a system?

A.

Phishing emails.

B.

Denial of service.

C.

Brute-force attacks.

D.

Social engineering.

Question # 7

What is the name of an alternative technique to counter the reduction in use of third-party cookies, where web publishers may consider utilizing data cached by a browser and returned with a subsequent request from the same resource to track unique users?

A.

Web beacon tracking.

B.

Browser fingerprinting.

C.

Entity tagging.

D.

Canvas fingerprinting.

Question # 8

What tactic does pharming use to achieve its goal?

A.

It modifies the user's Hosts file.

B.

It encrypts files on a user's computer.

C.

It creates a false display advertisement.

D.

It generates a malicious instant message.

Question # 9

A valid argument against data minimization is that it?

A.

Can limit business opportunities.

B.

Decreases the speed of data transfers.

C.

Can have an adverse effect on data quality.

D.

Increases the chance that someone can be identified from data.

Question # 10

How should the sharing of information within an organization be documented?

A.

With a binding contract.

B.

With a data flow diagram.

C.

With a disclosure statement.

D.

With a memorandum of agreement.

Go to page: