Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CIPP-US IAPP Certified Information Privacy Professional/United States (CIPP/US) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your IAPP CIPP-US Certified Information Privacy Professional/United States (CIPP/US) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 194 questions

California’s SB 1386 was the first law of its type in the United States to do what?

A.

Require commercial entities to disclose a security data breach concerning personal information about the state’s residents

B.

Require notification of non-California residents of a breach that occurred in California

C.

Require encryption of sensitive information stored on servers that are Internet connected

D.

Require state attorney general enforcement of federal regulations against unfair and deceptive trade practices

How did the Fair and Accurate Credit Transactions Act (FACTA) amend the Fair Credit Reporting Act (FCRA)?

A.

It expanded the definition of “consumer reports” to include communications relating to employee investigations

B.

It increased the obligation of organizations to dispose of consumer data in ways that prevent unauthorized access

C.

It stipulated the purpose of obtaining a consumer report can only be for a review of the employee’s credit worthiness

D.

It required employers to get an employee’s consent in advance of requesting a consumer report for internal investigation purposes

What is the purpose of a cure provision in a stale data privacy law?

A.

To allow a business a limited timeframe to fix alleged violations before facing enforcement.

B.

To allow consumers a period of time to discover their data has been mishandled

C.

To allow a state to initiate formal enforcement actions for a fixed time period.

D.

To allow certain provisions of a law to expire after a defined time period

Which of the following does Title VII of the Civil Rights Act prohibit an employer from asking a job applicant?

A.

Questions about age

B.

Questions about a disability

C.

Questions about a national origin

D.

Questions about intended pregnancy

Your company, an online store selling digital keys to video games, has received a data access request from an individual. Specifically, the individual wants access to her recent purchase history, as she has misplaced the emails containing the digital keys to multiple game purchases she made last month.

From a security standpoint, what would the user have to do under CCPA in order to acceptably verify her identity?

A.

Take a photo of herself with her driver license

B.

Provide a notarized affidavit signed by two witnesses.

C.

Log in to her password-protected account with the company

D.

Phone the company and provide her contact details and credit card number

When does the Telemarketing Sales Rule require an entity to share a do-not-call request across its organization?

A.

When the operational structures of its divisions are not transparent

B.

When the goods and services sold by its divisions are very similar

C.

When a call is not the result of an error or other unforeseen cause

D.

When the entity manages user preferences through multiple platforms

Although an employer may have a strong incentive or legal obligation to monitor employees’ conduct or behavior, some excessive monitoring may be considered an intrusion on employees’ privacy? Which of the following is the strongest example of excessive monitoring by the employer?

A.

An employer who installs a video monitor in physical locations, such as a warehouse, to ensure employees are performing tasks in a safe manner and environment.

B.

An employer who installs data loss prevention software on all employee computers to limit transmission of confidential company information.

C.

An employer who installs video monitors in physical locations, such as a changing room, to reduce the risk of sexual harassment.

D.

An employer who records all employee phone calls that involve financial transactions with customers completed over the phone.

A covered entity suffers a ransomware attack that affects the personal health information (PHI) of more than 500 individuals. According to Federal law under HIPAA, which of the following would the covered entity NOT have to report the breach to?

A.

Department of Health and Human Services

B.

The affected individuals

C.

The local media

D.

Medical providers

The FTC often negotiates consent decrees with companies found to be in violation of privacy principles. How does this benefit both parties involved?

A.

It standardizes the amount of fines.

B.

It simplifies the audit requirements.

C.

It avoids potentially harmful publicity.

D.

It spares the expense of going to trial.

Which of the following became the first state to pass a law specifically regulating the practices of data brokers?

A.

Washington.

B.

California.

C.

New York.

D.

Vermont.

What do the Civil Rights Act, Pregnancy Discrimination Act, Americans with Disabilities Act, Age Discrimination Act, and Equal Pay Act all have in common?

A.

They require employers not to discriminate against certain classes when employees use personal information

B.

They require that employers provide reasonable accommodations to certain classes of employees

C.

They afford certain classes of employees’ privacy protection by limiting inquiries concerning their personal information

D.

They permit employers to use or disclose personal information specifically about employees who are members of certain classes

Which of the following is NOT a common challenge large organizations face when implementing data portability?

A.

The presence of third-party data in the data to be ported.

B.

Technically compatible systems for transmission feasibility

C.

Security considerations in relation to the transfer of the data.

D.

The technical skillsets available in the transmitting organization.

Which authority supervises and enforces laws regarding advertising to children via the Internet?

A.

The Office for Civil Rights

B.

The Federal Trade Commission

C.

The Federal Communications Commission

D.

The Department of Homeland Security

What is the most likely reason that states have adopted their own data breach notification laws?

A.

Many states have unique types of businesses that require specific legislation

B.

Many lawmakers believe that federal enforcement of current laws has not been effective

C.

Many types of organizations are not currently subject to federal laws regarding breaches

D.

Many large businesses have intentionally breached the personal information of their customers

Which of the following is most likely to provide privacy protection to private-sector employees in the United States?

A.

State law, contract law, and tort law

B.

The Federal Trade Commission Act (FTC Act)

C.

Amendments one, four, and five of the U.S. Constitution

D.

The U.S. Department of Health and Human Services (HHS)

All of the following are tasks in the “Discover” phase of building an information management program EXCEPT?

A.

Facilitating participation across departments and levels

B.

Developing a process for review and update of privacy policies

C.

Deciding how aggressive to be in the use of personal information

D.

Understanding the laws that regulate a company’s collection of information

Which of the following became the first state to pass a law specifically regulating the collection of biometric data?

A.

California.

B.

Texas.

C.

Illinois.

D.

Washington.

A California resident has created an account on your company's online food delivery platform and placed several orders in the past month Later she submits a data subject request to access her personal information under the California Privacy Rights Act.

Based on the CPRA. which of the following data elements would your company NOT have to provide to the requestor once her identity has been verified?

A.

Inferences made about the individual for the company s internal purposes

B.

The loyalty account number assigned through the individuals use of the services

C.

The time stamp for the creation of the individual's account in the platform's database.

D.

The email address submitted by the individual as part of the account registration process.

What was the original purpose of the Federal Trade Commission Act?

A.

To ensure privacy rights of U.S. citizens

B.

To protect consumers

C.

To enforce antitrust laws

D.

To negotiate consent decrees with companies violating personal privacy

What role does the U.S. Constitution play in the area of workplace privacy?

A.

It provides enforcement resources to large employers, but not to small businesses

B.

It provides legal precedent for physical information security, but not for electronic security

C.

It provides contractual protections to members of labor unions, but not to employees at will

D.

It provides significant protections to federal and state governments, but not to private-sector employment

Page: 2 / 3
Total 194 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved