Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IAPP Exam CIPT Topic 1 Question 81 Discussion

Actual exam question for IAPP's CIPT exam
Question #: 81
Topic #: 1
[All CIPT Questions]

Data oriented strategies Include which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: D

An organization launching a new smart speaker to the market that has the capability to play music and provide news and weather updates would have concerns about context aware computing rather than browser fingerprinting from a privacy perspective. Context aware computing involves using information about an individual's location or behavior to tailor their experience with technology. This can raise concerns about how personal data is collected and used without individuals' knowledge or consent.


Contribute your Thoughts:

Lorrie
4 days ago
B is the way to go. Inform, Control, Enforce, Demonstrate - that's how you make sure your data is secure and your users are happy. Anything else is just hiding under the bed.
upvoted 0 times
...
Annett
9 days ago
Haha, C is a great list if you're trying to hide your data from everyone, including yourself! Gotta love a good dose of encryption and obfuscation.
upvoted 0 times
...
Brunilda
15 days ago
I'm torn between B and D. Consent, Contract, and Legal Obligation are definitely important data strategies, but I think Inform and Enforce are key too.
upvoted 0 times
...
Berry
16 days ago
I believe option B) Inform, Control, Enforce, Demonstrate could also be part of data oriented strategies to ensure compliance.
upvoted 0 times
...
Keshia
17 days ago
I agree with Pamela. Those techniques help protect sensitive information.
upvoted 0 times
...
Celia
18 days ago
Option B seems like the most comprehensive list of data-oriented strategies. Inform, Control, Enforce, and Demonstrate - that covers a lot of ground!
upvoted 0 times
...
Pamela
21 days ago
I think data oriented strategies include encryption, hashing, obfuscation, and randomization.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77