CIPM Certified Information Privacy Manager All-in-One Exam Guide by Peter H. Gregory
Author:Peter H. Gregory
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2021-12-15T00:00:00+00:00
Questions
1. A privacy leader is documenting the current state of an organizationâs privacy program so that progress over time can be better understood. The documentation of the current state is known as a(n):
A. Gap analysis
B. Risk assessment
C. Baseline
D. Audit
2. What is the purpose of the cloud services shared responsibility model?
A. Defines responsibilities when assigned to a project team
B. Defines which parties are responsible for which aspects of privacy
C. Defines which parties are responsible for which aspects of security and privacy
D. Defines which parties are responsible for which aspects of security
3. An organization that receives and transforms information on behalf of another organization is known as a:
A. Vendor
B. Fourth party
C. Controller
D. Processor
4. An organization retained a service provider for low-risk services, and the provider was classified at the lowest risk tier in the organizationâs TPRM program. Later, the organization expanded its use of the service provider, which now collects personal information from customers. What, if any, change is required in the organizationâs TPRM program?
A. No change is needed if the vendorâs contacts are unchanged.
B. Inform accounts payable of changes in payment levels.
C. Issue the questionnaire more frequently.
D. Reclassify the vendorâs risk tier and reassess accordingly.
5. An organization is negotiating a contract with a service provider classified at the highest vendor risk tier. The organizationâs attorney is contemplating language in the right-to-audit section of the legal agreement. Which of the following is the best term to use?
A. Right to audit in the event of a new privacy law
B. Right to audit in the event of a confirmed breach
C. Right to audit in any circumstance
D. Right to audit in the event of a suspected breach
6. When assessing a third-party service provider that has been classified at a high-risk tier, which of the following is the best method for confirming the answers provided in a privacy assessment questionnaire?
A. Require that the service provider attest that the questionnaire is accurate.
B. Require that the service provider provide specific program artifacts.
C. Perform a site visit to observe controls.
D. Require that the service provider be certified to ISO/IEC 27701.
7. A new privacy leader wants to baseline the existing program to help identify improvements over time. Which of the following is NOT required for a baseline?
A. Format of privacy records
B. List of applicable regulations
C. Privacy program metrics
D. Size and competence of staff
8. An organization has sent a questionnaire to a selected vendor for performing expense management services. The vendor stated in the questionnaire that it does not perform security awareness training. What is the organizationâs best response?
A. Accept the risk and proceed.
B. Contractually require the vendor to begin performing security awareness training.
C. Select a different service provider.
D. Create an entry in the risk register.
9. An organization wants to limit the use of USB external storage for the storage of personal information. What is the best first step to accomplish this?
A. Implement software to detect uses of USB storage of personal information.
B. Implement software to block uses of USB storage of personal information.
C. Create a policy that defines the limitations of USB storage.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7717)
Robo-Advisor with Python by Aki Ranin(7616)
Offensive Shellcode from Scratch by Rishalin Pillay(6099)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5014)
Ego Is the Enemy by Ryan Holiday(4956)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4177)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3882)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3618)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3285)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3221)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3171)
Agile Security Operations by Hinne Hettema(3122)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3108)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3083)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2982)
