PrepAway - Latest Free Exam Questions & Answers

Category: IAPP CIPT

Exam IAPP CIPT: Certified Information Privacy Technologist

What is a mistake organizations make when establishing privacy settings during the development of applications

What is a mistake organizations make when establishing privacy settings during the development of applications? A. Providing a user with too many choices. B. Failing to use “Do Not Trackā€ technology. C. Providing a user with too much third-party information. D. Failing to get explicit consent from a user on the use of cookies.

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an

Which Organization for Economic Co-operation and Development (OECD) privacy protection principle encourages an organization to obtain an individual s consent before transferring personal information? A. Individual participation. B. Purpose specification. C. Collection limitation. D. Accountability. Reference: http://oecdprivacy.org

Which activity would best support the principle of data quality?

Which activity would best support the principle of data quality? A. Providing notice to the data subject regarding any change in the purpose for collecting such data. B. Ensuring that the number of teams processing personal information is limited. C. Delivering information in a format that the data subject understands. D. Ensuring that information remains […]

What is the most important requirement to fulfill when transferring data out of an organization?

What is the most important requirement to fulfill when transferring data out of an organization? A. Ensuring the organization sending the data controls how the data is tagged by the receiver. B. Ensuring the organization receiving the data performs a privacy impact assessment. C. Ensuring the commitments made to the data owner are followed. D. […]

What is the distinguishing feature of asymmetric encryption?

What is the distinguishing feature of asymmetric encryption? A. It has a stronger key for encryption than for decryption. B. It employs layered encryption using dissimilar methods. C. It uses distinct keys for encryption and decryption. D. Itis designed to cross operating systems. Reference: https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties

Which of the following became a foundation for privacy principles and practices of countries and organizations

Which of the following became a foundation for privacy principles and practices of countries and organizations across the globe? A. The Personal Data Ordinance. B. The EU Data Protection Directive. C. The Code of Fair Information Practices. D. The Organization for Economic Co-operation and Development (OECD) Privacy Principles. Reference: https://privacyrights.org/resources/review-fair-information-principles-foundation-privacy-public-policy


Page 1 of 212