CITI EXAM MODULES 4-6 2025
QUESTIONS AND ANSWERS
Risks of harm in social and behavioral sciences generally fall into three categories -
....ANSWER ...-1) Invasion of privacy, 2) Breach of confidentiality, 3) Study
procedures
Two factors that must be considered in relation to each other when assessing risk -
....ANSWER ...-Probability and magnitude of harm AS well as population context
Why is independent assessment of risk is critical? - ....ANSWER ...-B/c
researchers are biased toward downplaying (and believing it) risks, and up-playing
benefits
How can researchers safeguard data from unauthorized access? - ....ANSWER ...-
1) Remove all direct identifiers as soon as possible. 2) Substitute codes for identifiers. 3)
Maintain code lists and data files in separate secure locations.
4) Use accepted methods to protect against indirect identification, such as aggregate
reporting or pseudonyms.
5) Use and protect computer passwords. 6) Encrypt transmitted and stored data. 7)
Access and store data on computers without Internet connections. 8) Obtain a Certificate
of Confidentiality.
...©️ 2025, ALL RIGHTS RESERVED 1
QUESTIONS AND ANSWERS
Risks of harm in social and behavioral sciences generally fall into three categories -
....ANSWER ...-1) Invasion of privacy, 2) Breach of confidentiality, 3) Study
procedures
Two factors that must be considered in relation to each other when assessing risk -
....ANSWER ...-Probability and magnitude of harm AS well as population context
Why is independent assessment of risk is critical? - ....ANSWER ...-B/c
researchers are biased toward downplaying (and believing it) risks, and up-playing
benefits
How can researchers safeguard data from unauthorized access? - ....ANSWER ...-
1) Remove all direct identifiers as soon as possible. 2) Substitute codes for identifiers. 3)
Maintain code lists and data files in separate secure locations.
4) Use accepted methods to protect against indirect identification, such as aggregate
reporting or pseudonyms.
5) Use and protect computer passwords. 6) Encrypt transmitted and stored data. 7)
Access and store data on computers without Internet connections. 8) Obtain a Certificate
of Confidentiality.
...©️ 2025, ALL RIGHTS RESERVED 1