Get your results instantly. Take our 10 practice questions and get an indication of where you stand!
1/10
The statement "data controllers should only collect the personal data that they really need" best describes which of the following principles?
A hacker has sent a phishing email to Tim, an employee of Acme Corp., who has full administrative access to Acme Corp.'s production databases. Acme Corp. stores the personal data of Sarah in one of its databases. Before sending this email, the hacker has called Tim, pretending to be an employee of Acme Corp.'s human resources department. With this call, the hacker hopes to make it more likely that Tim will click on a link contained in the phishing email. Tim eventually clicks on the link in the phishing email, exposing the personal data of Acme Corp.'s customers, including Sarah. In this example, what best describes the role of Tim?
The CIA Triad served as the basis for the development of which of the following?
What statement regarding privacy metrics is not accurate?
Acme Corp. has recently received a significant amount of negative publicity. Acme has hired a public relations firm to help counteract this negative publicity. This PR firm is in control of thousands of bot accounts across social media. The PR firm activates these bots to say positive things about Acme across the internet. What best describes what the PR firm is doing?
FacePage was recently founded to create a more privacy-friendly alternative to social media. As part of its practices, it stores all updates and pictures locally on their own device, which is then shared directly with friends in a peer-to-peer manner. What type of privacy-enhancing strategy is FacePage implementing with this method?
All of the following are key properties of a digital signature, except:
All of the following are practices that can help support the privacy engineering objective of disassociability, except:
Tricia is responsible for designing the architecture of a new software project that her company is developing. She is a big believer in privacy, and she does not want her company to have control over user's data. She therefore designs the system to allow users to share data directly with one another, rather than sending information to back-end servers controlled by her company. What type of architecture is Tricia utilizing?
Which approach to design considers how technology evolves alongside social structures?
Create a Privacy Bootcamp account to submit your exam and receive your score.
Already have a Privacy Bootcamp account? Sign in.
The CIPT credential indicates that you are an expert in building privacy directly into products and services. It is the Gold Standard for privacy technologists and engineers.
$499
✔   100+ Guided e-Study Modules
✔   450+ Practice Questions
✔   Practice and Assessment Tools
✔   Lifetime Access to All Materials
✔   Full Money-Back Guarantee*
✔   Industry-Leading Pass Rate
✔   Instant Access Upon Purchase
All you need to pass your CIPT Exam...
Previous