Certified Information Privacy Manager (C.I.P.M.) Exam Prep Test

328 Questions | Total Attempts: 16

SettingsSettingsSettings
Professional Certification Quizzes & Trivia

Questions and Answers
  • 1. 
    Type response below
  • 2. 
    The implementation of appropriate technical and organizational measures to ensure and be able to demonstrate that the handling of personal data is performed in accordance with relevant law, an idea codified in the EU General Data Protection Regulation and other frameworks, including APEC's Cross Border Privacy Rules. [Blank]
  • 3. 
    DLP network, storage, scans and privacy tools can be used to identify security and privacy risks to personal information. They can also be used to monitor for compliance with internal policies and procedures, and block e-mail or file transfers based on the data category and definitions. [Blank]
  • 4. 
    A U.S. professional organization of certified public accountants and co-creator of the WebTrust seal program. [Blank]
  • 5. 
    The process in which individually identifiable data is altered in such a way that it no longer can be related back to a given individual. [Blank]
  • 6. 
    [Blank] takes specific identifying values and makes them broader, such as changing a specific age (18) to an age range (18-24).
  • 7. 
    [Blank] addition takes identifying values from a given data set and switches them with identifying values from another individual in that data set.
  • 8. 
    [Blank] is the most basic version of anonymization and it simply removes some identifying values from data to reduce its identifiability.
  • 9. 
    A set of non-binding principles adopted by the Asia-Pacific Economic Cooperative that mirror the OECD Fair Information Privacy Practices. Though based on OECD Guidelines, they seek to promote electronic commerce throughout the Asia-Pacific region by balancing information privacy with business needs. [Blank]
  • 10. 
    The first of four phases of the privacy operational life cycle [Blank]
  • 11. 
    High-level, five-phase audit approach. The steps include: Audit Planning; Audit Preparation; Conducting the Audit; Reporting; and Follow-up. [Blank]
  • 12. 
    [Blank] is targeted at individuals based on the observation of their behavior over time.
  • 13. 
    [Blank] are appropriate safeguards allowed by the General Data Protection Regulation to facilitate cross-border transfers of personal data between the various entities of a corporate group worldwide.
  • 14. 
    The United States’ Federal Trade Commission’s [Blank] (BoC) enforces the nation's antitrust laws, which form the foundation of our free market economy. The antitrust laws promote the interests of consumers; they support unfettered markets and result in lower prices and more choices.
  • 15. 
    The United States’ Federal Trade Commission’s [Blank] (BoCP) stops unfair, deceptive and fraudulent business practices by collecting complaints and conducting investigations, suing companies and people that break the law, developing rules to maintain a fair marketplace, and educating consumers and businesses about their rights and responsibilities.
  • 16. 
    The United States’ Federal Trade Commission’s [Blank] (BoE) helps the FTC evaluate the economic impact of its actions by providing economic analysis for competition and consumer protection investigations and rulemakings, and analyzing the economic impact of government regulations on businesses and consumers.
  • 17. 
    The starting point for assessing the needs of the privacy organization, it defines the individual program needs and the ways to meet specific business goals, such as compliance with privacy laws or regulations, industry frameworks, customer requirements and other considerations. [Blank]
  • 18. 
    BCDR or [Blank] is a risk mitigation plan designed to prepare an organization for crises and to ensure critical business functions continue. The focus is to recover from a disaster when disruptions of any size are encountered.
  • 19. 
    The [Blank] (BCP) is typically drafted and maintained by key stakeholders, spelling out departmental responsibilities and actions teams must take before, during and after an event in order to help operations run smoothly. Situations covered in a BCP often include fire, flood, natural disasters (tornadoes and hurricanes), and terrorist attack.
  • 20. 
    [Blank] (COPPA) is a U.S. federal law that applies to the operators of commercial websites and online services that are directed to children under the age of 13. It also applies to general audience websites and online services that have actual knowledge that they are collecting personal information from children under the age of 13.
  • 21. 
    In the context of consent, [Blank] refers to the idea that consent must be freely given.
  • 22. 
    Three common information security principles from the 1960s. [Blank]
  • 23. 
    The three common information security principles from the 1960s that comprise the CIA Triad also known as Information Security Triad: [Blank]
  • 24. 
    A fair information practices principle, it is the principle stating there should be limits to the collection of personal data, that any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. [Blank]
  • 25. 
    This privacy requirement is one of the fair information practices. Individuals must be able to prevent the collection of their personal data, unless the disclosure is required by law. [Blank]
Back to Top Back to top