CIPT - Certified Information Privacy
Technologist Exam Questions and
Answers Graded A+
Development Lifecycle - Correct answer-Release Planning
Definition
Development
Validation
Deployment
There are four basic types of countermeasures - Correct answer-1. Preventative -
These work by keeping something from happening in the
first place. Examples of this include: security awareness training, firewall,
anti-virus, security guard and IPS.
2. Reactive - Reactive countermeasures come into effect only after an event
has already occurred.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
, 3. Detective - Examples of detective counter measures include: system
monitoring, IDS, anti-virus, motion detectors and IPS.
4. Administrative - These controls are the process of developing and
ensuring compliance with policy and procedures. These use policy to
protect an asset.
PCI DSS has three main stages of compliance - Correct answer-Collecting and
Storing - This involves the secure collection and tamper-proof storage
of log data so that it is available for analysis.
Reporting - This is the ability to prove compliance should an audit arise. The
organization should also show evidence that data protection controls are in place.
Monitoring and Alerting - This involves implementing systems to enable
administrators to monitor access and usage of data. There should also be evidence
that
log data is being collected and stored.
Re-Identification - Correct answer-re-identification refers to using data from a
single entity holding the data.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2
Technologist Exam Questions and
Answers Graded A+
Development Lifecycle - Correct answer-Release Planning
Definition
Development
Validation
Deployment
There are four basic types of countermeasures - Correct answer-1. Preventative -
These work by keeping something from happening in the
first place. Examples of this include: security awareness training, firewall,
anti-virus, security guard and IPS.
2. Reactive - Reactive countermeasures come into effect only after an event
has already occurred.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
, 3. Detective - Examples of detective counter measures include: system
monitoring, IDS, anti-virus, motion detectors and IPS.
4. Administrative - These controls are the process of developing and
ensuring compliance with policy and procedures. These use policy to
protect an asset.
PCI DSS has three main stages of compliance - Correct answer-Collecting and
Storing - This involves the secure collection and tamper-proof storage
of log data so that it is available for analysis.
Reporting - This is the ability to prove compliance should an audit arise. The
organization should also show evidence that data protection controls are in place.
Monitoring and Alerting - This involves implementing systems to enable
administrators to monitor access and usage of data. There should also be evidence
that
log data is being collected and stored.
Re-Identification - Correct answer-re-identification refers to using data from a
single entity holding the data.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2