CIPM IAPP Contoh Bank Soal Gratis Persiapan Ujian

The Certified Information Privacy Manager (CIPM) credential offered by the International Association of Privacy Professionals (IAPP) is a certification program designed for professionals who are responsible for managing and overseeing privacy programs within organizations. Here's an overview of CIPM and its benefits:



What is CIPM?

Definition: CIPM is a globally recognized certification that demonstrates proficiency in privacy management principles and practices.

Key Components:

  • Privacy Management: Covers the principles, practices, and tools for establishing, maintaining, and managing a comprehensive privacy program.
  • Legal and Regulatory Landscape: Provides an understanding of global privacy laws, regulations, and standards.
  • Privacy Governance: Focuses on establishing and maintaining effective privacy governance structures within organizations.
  • Data Protection Practices: Addresses practical aspects of implementing data protection measures, including data security and incident response.
  • Ethical Considerations: Emphasizes adherence to ethical standards and professional responsibilities in managing privacy programs.

Benefits of CIPM:

  1. Professional Recognition: Achieving CIPM certification demonstrates a commitment to excellence and professionalism in privacy management, enhancing your credibility and marketability as a privacy professional.

  2. Global Recognition: CIPM is recognized internationally as a standard for privacy management proficiency, allowing credential holders to pursue career opportunities worldwide.

  3. Career Advancement: CIPM certification opens up opportunities for career advancement in privacy and data protection roles, including privacy officer, compliance manager, and privacy consultant positions.

  4. Organizational Compliance: CIPM-certified professionals are equipped with the knowledge and skills to help organizations navigate complex privacy regulations and establish robust privacy programs, reducing the risk of non-compliance and potential fines.

  5. Network and Community: Joining the IAPP community provides access to a network of privacy professionals, resources, and continuing education opportunities, facilitating ongoing professional development and collaboration.

  6. Increased Marketability: With the growing emphasis on privacy and data protection, CIPM certification distinguishes individuals in the job market, making them more attractive to employers seeking skilled privacy professionals.

In summary, CIPM certification offers individuals the opportunity to demonstrate their expertise in privacy management, access career advancement opportunities, and contribute to organizational compliance with privacy regulations. It is a valuable credential for professionals aspiring to excel in the field of privacy and data protection.


CIPM EXAM PRACTICE (CONTOH SOAL)

Prepared by : 
Hery Purnama , SE., MM.
MCP, PMP, ITILF, CISA, CISM, CRISC, CGEIT,CDPSE, COBIT,
TOGAF, CDMP, CBAP, CTFL, CIPM


Question 1

SCENARIO -

Please use the following to answer the next question:

Natalia, the Chief Financial Officer (CFO) of the Nationwide Grill restaurant chain, had never seen her fellow executives so anxious. Last week, a data processing firm used by the company reported that its system may have been hacked, and customer data such as names, addresses, and birthdays may have been compromised. Although the attempt was proven unsuccessful, the scare has prompted several Nationwide Grill executives to question the company's privacy program at today's meeting.

Alice, a Vice President (VP), said that the incident could have opened the door to lawsuits, potentially damaging Nationwide Grill's market position. The Chief Information Officer (CIO), Brendan, tried to assure her that even if there had been an actual breach, the chances of a successful suit against the company were slim. But Alice remained unconvinced.

Spencer – a former Chief Executive Officer (CEO) and currently a senior advisor – said that he had always warned against the use of contractors for data processing. At the very least, he argued, they should be held contractually liable for telling customers about any security incidents. In his view, Nationwide Grill should not be forced to soil the company name for a problem it did not cause.

One of the Business Development (BD) executives, Haley, then spoke, imploring everyone to see reason. "Breaches can happen, despite organizations' best efforts," she remarked. "Reasonable preparedness is key." She reminded everyone of the incident seven years ago when the large grocery chain Tinkerton's had its financial information compromised after a large order of Nationwide Grill frozen dinners. As a long-time BD executive with a solid understanding of Tinkerton's's corporate culture, built up through many years of cultivating relationships, Haley was able to successfully manage the company's incident response.

Spencer replied that acting with reason means allowing security to be handled by the security functions within the company – not BD staff. In a similar way, he said, Human Resources (HR) needs to do a better job training employees to prevent incidents. He pointed out that Nationwide Grill employees are overwhelmed with posters, emails, and memos from both HR and the ethics department related to the company's privacy program. Both the volume and the duplication of information means that it is often ignored altogether.

Spencer said, "The company needs to dedicate itself to its privacy program and set regular in-person trainings for all staff once a month."

Alice responded that the suggestion, while well-meaning, is not practical. With many locations, local HR departments need to have flexibility with their training schedules. Silently, Natalia agreed.

The senior advisor, Spencer, has a misconception regarding?


A. The amount of responsibility that a data controller retains.

B. The appropriate role of an organization's security department.

C. The degree to which training can lessen the number of security incidents.

D. The role of Human Resources employees in an organization's privacy program.



Answer : C




Question 2

Formosa International operates in 20 different countries including the United States and France.

What organizational approach would make complying with a number of different regulations easier?


A. Data mapping.

B. Fair Information Practices.

C. Rationalizing requirements.

D. Decentralized privacy management.


Answer : B




Question 3

When implementing Privacy by Design (PbD), what would NOT be a key consideration?


A. Collection limitation.

B. Data minimization.

C. Limitations on liability.

D. Purpose specification.



Answer : C




Question 4

For an organization that has just experienced a data breach, what might be the least relevant metric for a company's privacy and governance team?


A. The number of security patches applied to company devices.

B. The number of privacy rights requests that have been exercised.

C. The number of Privacy Impact Assessments that have been completed.

D. The number of employees who have completed data awareness training.



Answer : A




Question 5

In which situation would a Privacy Impact Assessment (PIA) be the least likely to be required?


A. If a company created a credit-scoring platform five years ago.

B. If a health-care professional or lawyer processed personal data from a patient's file.

C. If a social media company created a new product compiling personal data to generate user profiles.

D. If an after-school club processed children's data to determine which children might have food allergies.



Answer : D




Question 6

Under the General Data Protection Regulation (GDPR), what must be included in a written agreement between the controller and processor in relation to processing conducted on the controller's behalf?


A. An obligation on the processor to report any personal data breach to the controller within 72 hours.

B. An obligation on both parties to report any serious personal data breach to the supervisory authority.

C. An obligation on both parties to agree to a termination of the agreement if the other party is responsible for a personal data breach.

D. An obligation on the processor to assist the controller in complying with the controller's obligations to notify the supervisory authority about personal data breaches.



Answer : A


Question 7

SCENARIO -

Please use the following to answer the next question:

Perhaps Jack Kelly should have stayed in the U.S. He enjoys a formidable reputation inside the company, Special Handling Shipping, for his work in reforming certain "rogue" offices. Last year, news broke that a police sting operation had revealed a drug ring operating in the Providence, Rhode Island office in the United States. Video from the office's video surveillance cameras leaked to news operations showed a drug exchange between Special Handling staff and undercover officers.

In the wake of this incident, Kelly had been sent to Providence to change the "hands off" culture that upper management believed had let the criminal elements conduct their illicit transactions. After a few weeks under Kelly's direction, the office became a model of efficiency and customer service. Kelly monitored his workers' activities using the same cameras that had recorded the illegal conduct of their former co-workers.

Now Kelly has been charged with turning around the office in Cork, Ireland, another trouble spot. The company has received numerous reports of the staff leaving the office unattended. When Kelly arrived, he found that even when present, the staff often spent their days socializing or conducting personal business on their mobile phones. Again, he observed their behaviors using surveillance cameras. He issued written reprimands to six staff members based on the first day of video alone.

Much to Kelly's surprise and chagrin, he and the company are now under investigation by the Data Protection Commissioner of Ireland for allegedly violating the privacy rights of employees. Kelly was told that the company's license for the cameras listed facility security as their main use, but he does not know why this matters. He has pointed out to his superiors that the company's training programs on privacy protection and data collection mention nothing about surveillance video.

You are a privacy protection consultant, hired by the company to assess this incident, report on the legal and compliance issues, and recommend next steps.

What does this example best illustrate about training requirements for privacy protection?


A. Training needs must be weighed against financial costs.

B. Training on local laws must be implemented for all personnel.

C. Training must be repeated frequently to respond to new legislation.

D. Training must include assessments to verify that the material is mastered.



Answer : B


Question 8

SCENARIO -

Please use the following to answer the next question:

Perhaps Jack Kelly should have stayed in the U.S. He enjoys a formidable reputation inside the company, Special Handling Shipping, for his work in reforming certain "rogue" offices. Last year, news broke that a police sting operation had revealed a drug ring operating in the Providence, Rhode Island office in the United States. Video from the office's video surveillance cameras leaked to news operations showed a drug exchange between Special Handling staff and undercover officers.

In the wake of this incident, Kelly had been sent to Providence to change the "hands off" culture that upper management believed had let the criminal elements conduct their illicit transactions. After a few weeks under Kelly's direction, the office became a model of efficiency and customer service. Kelly monitored his workers' activities using the same cameras that had recorded the illegal conduct of their former co-workers.

Now Kelly has been charged with turning around the office in Cork, Ireland, another trouble spot. The company has received numerous reports of the staff leaving the office unattended. When Kelly arrived, he found that even when present, the staff often spent their days socializing or conducting personal business on their mobile phones. Again, he observed their behaviors using surveillance cameras. He issued written reprimands to six staff members based on the first day of video alone.

Much to Kelly's surprise and chagrin, he and the company are now under investigation by the Data Protection Commissioner of Ireland for allegedly violating the privacy rights of employees. Kelly was told that the company's license for the cameras listed facility security as their main use, but he does not know why this matters. He has pointed out to his superiors that the company's training programs on privacy protection and data collection mention nothing about surveillance video.

You are a privacy protection consultant, hired by the company to assess this incident, report on the legal and compliance issues, and recommend next steps.

Knowing that the regulator is now investigating, what would be the best step to take?


A. Consult an attorney experienced in privacy law and litigation.

B. Use your background and knowledge to set a course of action.

C. If you know the organization is guilty, advise it to accept the punishment.

D. Negotiate the terms of a settlement before formal legal action takes place.



Answer : A


Question 9

SCENARIO -

Please use the following to answer the next question:

Perhaps Jack Kelly should have stayed in the U.S. He enjoys a formidable reputation inside the company, Special Handling Shipping, for his work in reforming certain "rogue" offices. Last year, news broke that a police sting operation had revealed a drug ring operating in the Providence, Rhode Island office in the United States. Video from the office's video surveillance cameras leaked to news operations showed a drug exchange between Special Handling staff and undercover officers.

In the wake of this incident, Kelly had been sent to Providence to change the "hands off" culture that upper management believed had let the criminal elements conduct their illicit transactions. After a few weeks under Kelly's direction, the office became a model of efficiency and customer service. Kelly monitored his workers' activities using the same cameras that had recorded the illegal conduct of their former co-workers.

Now Kelly has been charged with turning around the office in Cork, Ireland, another trouble spot. The company has received numerous reports of the staff leaving the office unattended. When Kelly arrived, he found that even when present, the staff often spent their days socializing or conducting personal business on their mobile phones. Again, he observed their behaviors using surveillance cameras. He issued written reprimands to six staff members based on the first day of video alone.

Much to Kelly's surprise and chagrin, he and the company are now under investigation by the Data Protection Commissioner of Ireland for allegedly violating the privacy rights of employees. Kelly was told that the company's license for the cameras listed facility security as their main use, but he does not know why this matters. He has pointed out to his superiors that the company's training programs on privacy protection and data collection mention nothing about surveillance video.

You are a privacy protection consultant, hired by the company to assess this incident, report on the legal and compliance issues, and recommend next steps.

What should you advise this company regarding the status of security cameras at their offices in the United States?


A. Add security cameras at facilities that are now without them.

B. Set policies about the purpose and use of the security cameras.

C. Reduce the number of security cameras located inside the building.

D. Restrict access to surveillance video taken by the security cameras and destroy the recordings after a designated period of time.



Answer : B


Question 10

You would like your organization to be independently audited to demonstrate compliance with international privacy standards and to identify gaps for remediation.

Which type of audit would help you achieve this objective?


A. First-party audit.

B. Second-party audit.

C. Third-party audit.

D. Fourth-party audit.



Answer : C


Question 11

An organization's business continuity plan or disaster recovery plan does NOT typically include what?


A. Recovery time objectives.

B. Emergency response guidelines.

C. Statement of organizational responsibilities.

D. Retention schedule for storage and destruction of information.



Answer : D


Question 12

SCENARIO -

Please use the following to answer the next question:

Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.

This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. "It's going to be great," the developer, Deidre Hoffman, tells you, "if, that is, we actually get it working!" She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. "It's just three young people," she says, "but they do great work." She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. "They do good work, so I chose them."

Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, "I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!"

Since it is too late to restructure the contract with the vendor or prevent the app from being deployed, what is the best step for you to take next?


A. Implement a more comprehensive suite of information security controls than the one used by the vendor.

B. Ask the vendor for verifiable information about their privacy protections so weaknesses can be identified.

C. Develop security protocols for the vendor and mandate that they be deployed.

D. Insist on an audit of the vendor's privacy procedures and safeguards.



Answer : B


Question 13

SCENARIO -

Please use the following to answer the next question:

Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.

This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. "It's going to be great," the developer, Deidre Hoffman, tells you, "if, that is, we actually get it working!" She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. "It's just three young people," she says, "but they do great work." She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. "They do good work, so I chose them."

Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, "I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!"

Which is the best first step in understanding the data security practices of a potential vendor?


A. Requiring the vendor to complete a questionnaire assessing International Organization for Standardization (ISO) 27001 compliance.

B. Conducting a physical audit of the vendor's facilities.

C. Conducting a penetration test of the vendor's data security structure.

D. Examining investigation records of any breaches the vendor has experienced.



Answer : D


Question 14

SCENARIO -

Please use the following to answer the next question:

Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.

This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. "It's going to be great," the developer, Deidre Hoffman, tells you, "if, that is, we actually get it working!" She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. "It's just three young people," she says, "but they do great work." She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. "They do good work, so I chose them."

Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, "I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!"

What safeguard can most efficiently ensure that privacy protection is a dimension of relationships with vendors?


A. Include appropriate language about privacy protection in vendor contracts.

B. Perform a privacy audit on any vendor under consideration.

C. Require that a person trained in privacy protection be part of all vendor selection teams.

D. Do business only with vendors who are members of privacy trade associations.



Answer : C


Question 15

SCENARIO -

Please use the following to answer the next question:

Edufox has hosted an annual convention of users of its famous e-learning software platform, and over time, it has become a grand event. It fills one of the large downtown conference hotels and overflows into the others, with several thousand attendees enjoying three days of presentations, panel discussions and networking. The convention is the centerpiece of the company's product rollout schedule and a great training opportunity for current users. The sales force also encourages prospective clients to attend to get a better sense of the ways in which the system can be customized to meet diverse needs and understand that when they buy into this system, they are joining a community that feels like family.

This year's conference is only three weeks away, and you have just heard news of a new initiative supporting it: a smartphone app for attendees. The app will support late registration, highlight the featured presentations and provide a mobile version of the conference program. It also links to a restaurant reservation system with the best cuisine in the areas featured. "It's going to be great," the developer, Deidre Hoffman, tells you, "if, that is, we actually get it working!" She laughs nervously but explains that because of the tight time frame she'd been given to build the app, she outsourced the job to a local firm. "It's just three young people," she says, "but they do great work." She describes some of the other apps they have built. When asked how they were selected for this job, Deidre shrugs. "They do good work, so I chose them."

Deidre is a terrific employee with a strong track record. That's why she's been charged to deliver this rushed project. You're sure she has the best interests of the company at heart, and you don't doubt that she's under pressure to meet a deadline that cannot be pushed back. However, you have concerns about the app's handling of personal data and its security safeguards. Over lunch in the break room, you start to talk to her about it, but she quickly tries to reassure you, "I'm sure with your help we can fix any security issues if we have to, but I doubt there'll be any. These people build apps for a living, and they know what they're doing. You worry too much, but that's why you're so good at your job!"

You want to point out that normal protocols have NOT been followed in this matter.

Which process in particular has been neglected?


A. Forensic inquiry.

B. Data mapping.

C. Privacy breach prevention.

D. Vendor due diligence or vetting.



Answer : D



Question 16 ( Exam A)

Why were the nongovernmental privacy organizations, Electronic Frontier Foundation (EFF) and Electronic Privacy Information Center (EPIC), established?


A. To promote consumer confidence in the Internet industry.

B. To improve the user experience during online shopping.

C. To protect civil liberties and raise consumer awareness.

D. To promote security on the Internet through strong encryption.



Answer : C


Question 17 ( Exam A)

What is the main function of the Asia-Pacific Economic Cooperation Privacy Framework?


A. Enabling regional data transfers.

B. Protecting data from parties outside the region.

C. Establishing legal requirements for privacy protection in the region.

D. Marketing privacy protection technologies developed in the region.



Answer : A


Question 18 ( Exam A)

Which of the following is TRUE about the Data Protection Impact Assessment (DPIA) process as required under the General Data Protection Regulation (GDPR)?


A. The DPIA result must be reported to the corresponding supervisory authority.

B. The DPIA report must be published to demonstrate the transparency of the data processing.

C. The DPIA must include a description of the proposed processing operation and its purpose.

D. The DPIA is required if the processing activity entails risk to the rights and freedoms of an EU individual.



Answer : D


Question 19 ( Exam A)

As a Data Protection Officer (DPO), one of your roles entails monitoring changes in laws and regulations and updating policies accordingly.

How would you most effectively execute this responsibility?


A. Consult an external lawyer.

B. Regularly engage regulators.

C. Attend workshops and interact with other professionals.

D. Subscribe to email list-serves that report on regulatory changes.



Answer : D


Question 20 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe. During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.

John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe's previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.

At the meeting, Derrick emphasized that email is the primary method for the firm's lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn't have the time or resource to look for another solution. Furthermore, the off-premises email continuity service will only be turned on when the email service at A&M LLP's primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.

Which of the following is the most effective control to enforce MessageSafe's implementation of appropriate technical countermeasures to protect the personal data received from A&M LLP?


A. MessageSafe must apply due diligence before trusting Cloud Inc. with the personal data received from A&M LLP.

B. MessageSafe must flow-down its data protection contract terms with A&M LLP to Cloud Inc.

C. MessageSafe must apply appropriate security controls on the cloud infrastructure.

D. MessageSafe must notify A&M LLP of a data breach.



Answer : D


Question 21 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe. During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.

John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe's previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.

At the meeting, Derrick emphasized that email is the primary method for the firm's lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn't have the time or resource to look for another solution. Furthermore, the off- premises email continuity service will only be turned on when the email service at A&M LLP's primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.

Which of the following is a TRUE statement about the relationship among the organizations?


A. Cloud Inc. must notify A&M LLP of a data breach immediately.

B. MessageSafe is liable if Cloud Inc. fails to protect data from A&M LLP.

C. Cloud Inc. should enter into a data processor agreement with A&M LLP.

D. A&M LLP's service contract must be amended to list Cloud Inc. as a sub-processor.



Answer : A


Question 22 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

John is the new privacy officer at the prestigious international law firm – A&M LLP. A&M LLP is very proud of its reputation in the practice areas of Trusts & Estates and Merger & Acquisition in both U.S. and Europe. During lunch with a colleague from the Information Technology department, John heard that the Head of IT, Derrick, is about to outsource the firm's email continuity service to their existing email security vendor – MessageSafe. Being successful as an email hygiene vendor, MessageSafe is expanding its business by leasing cloud infrastructure from Cloud Inc. to host email continuity service for A&M LLP.

John is very concerned about this initiative. He recalled that MessageSafe was in the news six months ago due to a security breach. Immediately, John did a quick research of MessageSafe's previous breach and learned that the breach was caused by an unintentional mistake by an IT administrator. He scheduled a meeting with Derrick to address his concerns.

At the meeting, Derrick emphasized that email is the primary method for the firm's lawyers to communicate with clients, thus it is critical to have the email continuity service to avoid any possible email downtime. Derrick has been using the anti-spam service provided by MessageSafe for five years and is very happy with the quality of service provided by MessageSafe. In addition to the significant discount offered by MessageSafe, Derrick emphasized that he can also speed up the onboarding process since the firm already has a service contract in place with MessageSafe. The existing on-premises email continuity solution is about to reach its end of life very soon and he doesn't have the time or resource to look for another solution. Furthermore, the off- premises email continuity service will only be turned on when the email service at A&M LLP's primary and secondary data centers are both down, and the email messages stored at MessageSafe site for continuity service will be automatically deleted after 30 days.

Which of the following is NOT an obligation of MessageSafe as the email continuity service provider for A&M LLP?


A. Privacy compliance.

B. Security commitment.

C. Certifications to relevant frameworks.

D. Data breach notification to A&M LLP.



Answer : C


Question 23 ( Exam A)

In privacy protection, what is a "covered entity"?


A. Personal data collected by a privacy organization.

B. An organization subject to the privacy provisions of the Health Insurance Portability and Accountability Act (HIPAA).

C. A privacy office or team fully responsible for protecting personal information.

D. Hidden gaps in privacy protection that may go unnoticed without expert analysis.



Answer : B


Question 24 ( Exam A)

Which of the following best describes proper compliance for an international organization using Binding Corporate Rules (BCRs) as a controller or processor?


A. Employees must sign an ad hoc contractual agreement each time personal data is exported.

B. All employees are subject to the rules in their entirety, regardless of where the work is taking place.

C. All employees must follow the privacy regulations of the jurisdictions where the current scope of their work is established.

D. Employees who control personal data must complete a rigorous certification procedure, as they are exempt from legal enforcement.



Answer : A


Question 25 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all of their basic networking needs. He plans to hire more employees once Richard gets settled and assesses the office's strategies for growth.

Immediately upon arrival, Richard was amazed at the amount of work that needed to done in order to modernize the office, mostly in regard to the handling of clients' personal data. His first goal is to digitize all the records kept in file cabinets, as many of the documents contain personally identifiable financial and medical data. Also, Richard has noticed the massive amount of copying by the administrative assistant throughout the day, a practice that not only adds daily to the number of files in the file cabinets, but may create security issues unless a formal policy is firmly in place Richard is also concerned with the overuse of the communal copier/printer located in plain view of clients who frequent the building. Yet another area of concern is the use of the same fax machine by all of the employees. Richard hopes to reduce its use dramatically in order to ensure that personal data receives the utmost security and protection, and eventually move toward a strict Internet faxing policy by the year's end.

Richard expressed his concerns to his grandfather, who agreed, that updating data storage, data security, and an overall approach to increasing the protection of personal data in all facets is necessary Mr. McAdams granted him the freedom and authority to do so. Now Richard is not only beginning a career as an attorney, but also functioning as the privacy officer of the small firm. Richard plans to meet with the IT employee the following day, to get insight into how the office computer system is currently set-up and managed.

Richard believes that a transition from the use of fax machine to Internet faxing provides all of the following security benefits EXCEPT?


A. Greater accessibility to the faxes at an off-site location.

B. The ability to encrypt the transmitted faxes through a secure server.

C. Reduction of the risk of data being seen or copied by unauthorized personnel.

D. The ability to store faxes electronically, either on the user's PC or a password-protected network server.



Answer : A


Question 26 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all of their basic networking needs. He plans to hire more employees once Richard gets settled and assesses the office's strategies for growth.

Immediately upon arrival, Richard was amazed at the amount of work that needed to done in order to modernize the office, mostly in regard to the handling of clients' personal data. His first goal is to digitize all the records kept in file cabinets, as many of the documents contain personally identifiable financial and medical data. Also, Richard has noticed the massive amount of copying by the administrative assistant throughout the day, a practice that not only adds daily to the number of files in the file cabinets, but may create security issues unless a formal policy is firmly in place Richard is also concerned with the overuse of the communal copier/printer located in plain view of clients who frequent the building. Yet another area of concern is the use of the same fax machine by all of the employees. Richard hopes to reduce its use dramatically in order to ensure that personal data receives the utmost security and protection, and eventually move toward a strict Internet faxing policy by the year's end.

Richard expressed his concerns to his grandfather, who agreed, that updating data storage, data security, and an overall approach to increasing the protection of personal data in all facets is necessary Mr. McAdams granted him the freedom and authority to do so. Now Richard is not only beginning a career as an attorney, but also functioning as the privacy officer of the small firm. Richard plans to meet with the IT employee the following day, to get insight into how the office computer system is currently set-up and managed.

As Richard begins to research more about Data Lifecycle Management (DLM), he discovers that the law office can lower the risk of a data breach by doing what?


A. Prioritizing the data by order of importance.

B. Minimizing the time it takes to retrieve the sensitive data.

C. Reducing the volume and the type of data that is stored in its system.

D. Increasing the number of experienced staff to code and categorize the incoming data.



Answer : C


Question 27 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all of their basic networking needs. He plans to hire more employees once Richard gets settled and assesses the office's strategies for growth.

Immediately upon arrival, Richard was amazed at the amount of work that needed to done in order to modernize the office, mostly in regard to the handling of clients' personal data. His first goal is to digitize all the records kept in file cabinets, as many of the documents contain personally identifiable financial and medical data. Also, Richard has noticed the massive amount of copying by the administrative assistant throughout the day, a practice that not only adds daily to the number of files in the file cabinets, but may create security issues unless a formal policy is firmly in place Richard is also concerned with the overuse of the communal copier/printer located in plain view of clients who frequent the building. Yet another area of concern is the use of the same fax machine by all of the employees. Richard hopes to reduce its use dramatically in order to ensure that personal data receives the utmost security and protection, and eventually move toward a strict Internet faxing policy by the year's end.

Richard expressed his concerns to his grandfather, who agreed, that updating data storage, data security, and an overall approach to increasing the protection of personal data in all facets is necessary Mr. McAdams granted him the freedom and authority to do so. Now Richard is not only beginning a career as an attorney, but also functioning as the privacy officer of the small firm. Richard plans to meet with the IT employee the following day, to get insight into how the office computer system is currently set-up and managed.

Which of the following policy statements needs additional instructions in order to further protect the personal data of their clients?


A. All faxes sent from the office must be documented and the phone number used must be double checked to ensure a safe arrival.

B. All unused copies, prints, and faxes must be discarded in a designated recycling bin located near the work station and emptied daily.

C. Before any copiers, printers, or fax machines are replaced or resold, the hard drives of these devices must be deleted before leaving the office.

D. When sending a print job containing personal data, the user must not leave the information visible on the computer screen following the print command and must retrieve the printed document immediately.



Answer : D


Question 28 ( Exam A)

SCENARIO -

Please use the following to answer the next question:

Richard McAdams recently graduated law school and decided to return to the small town of Lexington, Virginia to help run his aging grandfather's law practice. The elder McAdams desired a limited, lighter role in the practice, with the hope that his grandson would eventually take over when he fully retires. In addition to hiring Richard, Mr. McAdams employs two paralegals, an administrative assistant, and a part-time IT specialist who handles all of their basic networking needs. He plans to hire more employees once Richard gets settled and assesses the office's strategies for growth.

Immediately upon arrival, Richard was amazed at the amount of work that needed to done in order to modernize the office, mostly in regard to the handling of clients' personal data. His first goal is to digitize all the records kept in file cabinets, as many of the documents contain personally identifiable financial and medical data. Also, Richard has noticed the massive amount of copying by the administrative assistant throughout the day, a practice that not only adds daily to the number of files in the file cabinets, but may create security issues unless a formal policy is firmly in place Richard is also concerned with the overuse of the communal copier/printer located in plain view of clients who frequent the building. Yet another area of concern is the use of the same fax machine by all of the employees. Richard hopes to reduce its use dramatically in order to ensure that personal data receives the utmost security and protection, and eventually move toward a strict Internet faxing policy by the year's end.

Richard expressed his concerns to his grandfather, who agreed, that updating data storage, data security, and an overall approach to increasing the protection of personal data in all facets is necessary Mr. McAdams granted him the freedom and authority to do so. Now Richard is not only beginning a career as an attorney, but also functioning as the privacy officer of the small firm. Richard plans to meet with the IT employee the following day, to get insight into how the office computer system is currently set-up and managed.

Richard needs to closely monitor the vendor in charge of creating the firm's database mainly because of what?


A. The vendor will be required to report any privacy violations to the appropriate authorities.

B. The vendor may not be aware of the privacy implications involved in the project.

C. The vendor may not be forthcoming about the vulnerabilities of the database.

D. The vendor will be in direct contact with all of the law firm's personal data.



Answer : B


Question 29 ( Exam A)

What should be the first major goal of a company developing a new privacy program?


A. To survey potential funding sources for privacy team resources.

B. To schedule conversations with executives of affected departments.

C. To identify potential third-party processors of the organization's information.

D. To create Data Lifecycle Management policies and procedures to limit data collection.



Answer : D


Question 30 ( Exam A)

Which is TRUE about the scope and authority of data protection oversight authorities?


A. The Office of the Privacy Commissioner (OPC) of Canada has the right to impose financial sanctions on violators.

B. All authority in the European Union rests with the Data Protection Commission (DPC).

C. No one agency officially oversees the enforcement of privacy regulations in the United States.

D. The Asia-Pacific Economic Cooperation (APEC) Privacy Frameworks require all member nations to designate a national data protection authority.



Answer : A

Posting Komentar

0 Komentar