2025| Module #3: CITI |2025 Update|Complete
Frequently Tested Questions And Verified
Answers With Rationales|100% Accurate
Answers | Already Graded A+|Get it right!!
Terms in this set (77)
Data are made Destroying all identifiers connected to the data.
anonymous by
-Destroying all identifiers
connected to the data.
-Requiring all members
of the research team to
sign confidentiality
agreements.
-Keeping the key linking
names to responses in a
secure location.
-Reporting data in
aggregate form in
publications resulting
from the research.
https://quizlet.com/991965581/2025-module-3-citi-2025-updatecomplete-frequently-tested-questions-and-verified-answers-with-rationales100-ac… 1/62
,1/12/25, 9:37 AM 2025| Module #3: CITI |2025 Update|Complete Frequently Tested Questions And Verified Answers With Rationales|100% Accu…
In a longitudinal study Securing a Certificate of Confidentiality
that will follow children
from kindergarten
through high school and
will collect information
about illegal activities,
which of the following
confidentiality
procedures would
protect against
compelled disclosure of
individually identifiable
information?
-Using data encryption
for stored files.
-Securing a Certificate of
Confidentiality.
-Waiving documentation
of consent.
-Using pseudonyms in
research reports.
https://quizlet.com/991965581/2025-module-3-citi-2025-updatecomplete-frequently-tested-questions-and-verified-answers-with-rationales100-ac… 2/62
,1/12/25, 9:37 AM 2025| Module #3: CITI |2025 Update|Complete Frequently Tested Questions And Verified Answers With Rationales|100% Accu…
When a focus group The researcher cannot control what participants
deals with a potentially repeat about others outside the group
sensitive topic, which of
the following statements
about providing
confidentiality to focus
group participants is
correct?
-If group members know
each other confidentiality
is not an issue.
-Using pseudonyms in
reports removes the
concern about any
confidences shared in
the group.
-The researcher cannot
control what participants
repeat about others
outside the group.
-If group participants
sign confidentiality
agreements, the
researcher can guarantee
confidentiality.
https://quizlet.com/991965581/2025-module-3-citi-2025-updatecomplete-frequently-tested-questions-and-verified-answers-with-rationales100-ac… 3/62
, 1/12/25, 9:37 AM 2025| Module #3: CITI |2025 Update|Complete Frequently Tested Questions And Verified Answers With Rationales|100% Accu…
A researcher leaves a There was neither a violation of privacy nor a breach
research file in her car of confidentiality
while she attends a
concert and her car is
stolen. The file contains
charts of aggregated
numerical data from a
research study with
human subjects, but no
other documents. The
consent form said that no
identifying information
would be retained, and
the researcher adhered
to that component.
Which of the following
statements best
characterizes what
occurred?
-There was neither a
violation of privacy nor a
breach of confidentiality
-The subjects' privacy has
been violated.
-Confidentiality of the
data has been breached
-There was both a
violation of privacy and a
breach of confidentiality.
https://quizlet.com/991965581/2025-module-3-citi-2025-updatecomplete-frequently-tested-questions-and-verified-answers-with-rationales100-ac… 4/62