Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPT All Questions

View all questions & answers for the CIPT exam

Exam CIPT topic 1 question 30 discussion

Actual exam question from IAPP's CIPT
Question #: 30
Topic #: 1
[All CIPT Questions]

Which of the following would best improve an organization' s system of limiting data use?

  • A. Implementing digital rights management technology.
  • B. Confirming implied consent for any secondary use of data.
  • C. Applying audit trails to resources to monitor company personnel.
  • D. Instituting a system of user authentication for company personnel.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ssourav
3 months, 2 weeks ago
Selected Answer: C
C. Applying audit trails to resources to monitor company personnel goes beyond just controlling access—it actively monitors and records how data is used after access is granted. This is crucial for limiting data use because it provides a mechanism to detect and respond to any misuse or unauthorized use of data within the organization. In summary: A and D are about controlling access and rights, but C specifically focuses on limiting data use by providing continuous oversight through monitoring and auditing, making it the best option for improving the system of limiting data use.
upvoted 1 times
...
PaigeH7
8 months, 1 week ago
Selected Answer: A
DRM helps control access to digital content and restricts how data is used, ensuring that only authorized individuals can access and manipulate it.
upvoted 1 times
...
rajiabdmjd
1 year, 7 months ago
Selected Answer: D
Instituting a system of user authentication for company personnel.
upvoted 1 times
...
rajiabdmjd
1 year, 7 months ago
I think D
upvoted 1 times
...
Sbowo
2 years, 11 months ago
Answer is D, based on Privacy in Technology book. All answer is correct, but base on priority, first one is explicit consent on secondary use, second is user authentication
upvoted 3 times
...
k4d4v4r
3 years ago
C is correct. DRM is more related to end users. For systems you should rely on audit logs to monitor usage of data.
upvoted 2 times
...
837vq3
3 years, 1 month ago
Digital Rights Management: This is used to ensure that digital content is only delivered to those who are authorized to receive it. It can also limit what assigned users can do with the content. For example, a person may be permitted to read a © International Association of Privacy Professionals 10 the document, but not allowed to print it, email it to others, copy content from it or modify it.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...