Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Ace Your CIPT Information Privacy Technologist Exam

Page: 9 / 16
Question 36

Which of the following is one of the fundamental principles of information security?

Options:

A.

Accountability.

B.

Accessibility.

C.

Confidentiality.

D.

Connectivity.

Question 37

An organization is reliant on temporary contractors for performing data analytics and they require access to personal data via software-as-a-service to perform their job. When the temporary contractor completes their work assignment, what woul^.be the most effective way to safeguard privacy and access to personal data when they leave?

Options:

A.

Set a system-based expiry that requires management reauthorization for online access for accounts that have been active more than 6 months.

B.

Establish a predetermined automatic account expiration date based on contract timescales.

C.

Require temporary contractors to sign a non-disclosure agreement, security acceptable use policy, and online access authorizations by hiring managers.

D.

Mandate hiring managers to email IT or Security team when the contractor leaves.

Question 38

Users of a web-based email service have their accounts breached through compromised login credentials. Which possible consequences of the breach illustrate the two categories of Calo’s Harm Dimensions?

Options:

A.

Financial loss and blackmail.

B.

Financial loss and solicitation.

C.

Identity theft and embarrassment.

D.

Identity theft and the leaking of information.

Question 39

When releasing aggregates, what must be performed to magnitude data to ensure privacy?

Options:

A.

Value swapping.

B.

Noise addition.

C.

Basic rounding.

D.

Top coding.

Page: 9 / 16
Exam Code: CIPT
Exam Name: Certified Information Privacy Technologist
Last Update: Nov 23, 2024
Questions: 220
CIPT pdf

CIPT PDF

$25.5  $84.99
CIPT Engine

CIPT Testing Engine

$28.5  $94.99
CIPT PDF + Engine

CIPT PDF + Testing Engine

$40.5  $134.99