IAPP CIPM Exam Questions

Questions for the CIPM were updated on : Dec 29 ,2025

Page 1 out of 17. Viewing questions 1-15 out of 242

Question 1

Last year Ecosoft 8150 was hacked and a number of servers and programs were affected. Since the
incident, the company started collecting metrics on data privacy and system outages to try to stop it
from happening in the future.
What analysis would be most helpful based on the data they have collected?

  • A. Return on Investment (ROI).
  • B. Compliance analysis.
  • C. Business Resiliency.
  • D. Trend analysis.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

PbD is the framework that?

  • A. Dictates the design of the system development life cycle.
  • B. Establishes risk-based expectations for privacy management.
  • C. Embeds privacy into the design of technology, systems and practices.
  • D. Guides organizations in designing, implementing and managing privacy programs in line with privacy laws and best practices.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

You are the privacy officer at a university. Recently, the police have contacted you as they suspect
that one of your students is using a library computer to commit financial fraud. The police would like
your assistance in investigating this individual and are requesting computer logs and usage data of
the student.
What Is your first step in responding to the request?

  • A. Refuse the request as the police do not have a warrant.
  • B. Provide the data to police and record it for your own archives.
  • C. Contact the university's legal counsel to determine if the request is lawful.
  • D. Review policies, procedures and legislation to determine the university's obligation to co-operate with the police.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

After an incident, all of the following are potential objectives for improvements to the way an
organization handles breach management EXCEPT?

  • A. Contacting regulators.
  • B. Reviewing lessons learned.
  • C. Ensuring appropriate privacy/security funding.
  • D. Getting commitment from stakeholders related to any process updates.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Under the European Data Protection Board (EDPB). which processing operation would require a
DPIA?

  • A. An online newspaper using its subscriber list to email a daily newsletter.
  • B. A healthcare clinic that processes personal data of its patients in its billing system.
  • C. A hospital processing patient's genetic and health data in its hospital information system.
  • D. An online store displaying advertisements based on items viewed or purchased on its own website.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following controls are generally NOT part of a PIA review?

  • A. Access.
  • B. Incident.
  • C. Retention.
  • D. Collection.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

A Privacy Threshold Analysis (PTA), Privacy Impact Assessment (PIA) and Data Protection Impact
Assessment (DPIA) are conducted during what phase of a System Development Life Cycle (SDLC)?

  • A. Testing.
  • B. Design.
  • C. Deployment.
  • D. Maintenance.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

SCENARIO
Please use the following lo answer the next QUESTIO N:
The board risk committee of your organization is particularly concerned not only by the number and
frequency of data breaches reported to it over the past 12 months, but also the inconsistency in
responses and poor incident response turnaround times.
Upon reviewing the current incident response plan (IRP), it was discovered that while the business
continuity plan (BCP) had been updated on time, the IRP, linked to BCP. was last updated over three
years ago.
The board risk committee has noted this as high risk especially since company policy is to review and
update policies and plans annually. Consequently, the newly appointed data protection officer (DPO)
was requested to provide a paper on how she would remediate the situation.
As a seasoned data privacy professional, you have been requested to assist the new DPO.
Which additional proactive step listed below would best mitigate these risks in the future?

  • A. Make the IRP a live document that is evaluated for completeness during each incident.
  • B. Make copies of the IRP in various place so it can be accessed remotely or when offline.
  • C. Add comments about incidents to the IRP to record what action was taken.
  • D. Make sure that everyone listed in the IRP has a copy of the IRP
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

SCENARIO
Please use the following lo answer the next QUESTIO N:
The board risk committee of your organization is particularly concerned not only by the number and
frequency of data breaches reported to it over the past 12 months, but also the inconsistency in
responses and poor incident response turnaround times.
Upon reviewing the current incident response plan (IRP), it was discovered that while the business
continuity plan (BCP> had been updated on time, the IRP, linked to BCP. was last updated over three
years ago.
The board risk committee has noted this as high risk especially since company policy is to review and
update policies and plans annually. Consequently, the newly appointed data protection officer (DPO)
was requested to provide a paper on how she would remediate the situation.
As a seasoned data privacy professional, you have been requested to assist the new DPO.
Your first recommendation in addressing the board risk committee's concerns is to?

  • A. Integrate the IRP into the BCP so it is not a stand-alone document.
  • B. Conduct a table-top exercise based on the version of the IRP that is currently on record.
  • C. Focus on training and awareness sessions in order to familiarize relevant staff with current policies and procedures.
  • D. Update the IRP with the applicable emergency contact information, policies and procedures, as well as timelines and action steps.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

A marketing team regularly exports spreadsheets to use (or analysis including customer name,
birthdate and home address. These spreadsheets are routinely shared between members of various
teams via email even with employees that do not need such granular data.
What is the best way to lower overall risk?

  • A. Set up security measures in the company's email client to prevent spreadsheets with customer information from accidentally being sent to external recipients.
  • B. Anonymize exportable data by creating categories of information, like age range and geographic region.
  • C. Allow the free exchange of information to continue but require spreadsheets be password protected.
  • D. Allow only certain users to export customer data from the database.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following methods analyzes data collected based the scale and not the endpoint of the
privacy program?

  • A. Trend Analysis.
  • B. Business Resiliency.
  • C. Return on Investment.
  • D. The Privacy Maturity Model.
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Protection from threats to facilities, systems that process and store electronic copies and IT
work/equipment locations best describes which category of security control?

  • A. Physical Control.
  • B. Technical Control.
  • C. Geographic Control.
  • D. Administrative Control.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Creating a privacy governance model for an organization that is required to appoint data protection
officers under the GDPR poses what additional challenge?

  • A. They must react without delay to suppliers.
  • B. They must reply personally to data subjects.
  • C. They must report directly to top management.
  • D. They must respond immediately to employees.
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Under the GDPR, what obligation does a data controller or processor have after appointing a data
protection officer (DPO)?

  • A. To submit for approval to the DPO a code of conduct to govern organizational practices and demonstrate compliance with data protection principles.
  • B. To provide resources necessary to carry out the defined tasks of the DPO and to maintain their expert knowledge.
  • C. To ensure that the DPO acts as the sole point of contact for individuals' questions about their personal data.
  • D. To ensure that the DPO receives sufficient instructions regarding the exercise of their defined tasks.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

SCENARIO
Please use the following lo answer the next QUESTIO N:
You are the privacy manager within the privacy office of a National Forest Parks and Recreation
Department. While having lunch with a colleague from the IT division, you learn that the IT director
has put out a request for proposal (RFP) which calls for a system that collects the personal data of
park attendees.
You consult with a few other colleagues in IT and learn that the RFP is worded such that it leaves it to
the vendors to demonstrate what information they would collect from people who enter parks
anywhere in the country, either in a vehicle or on foot. A partial list of the information collected
includes:
• personal identifiers such as name, address, age, gender;
• vehicle registration information:
• facial images of park attendees;
• health information (e.g.. physical disabilities, use of mobility devices)
The stated purpose of the RFP is to:
"Improve the National Forest. Parks, and Recreation Department's ability to track and monitor
service usage thereby Increasing the robustness of our customer data and to improve service
offerings.''
Companies have already started submitting proposals for software solutions that address these
information gathering practices. There is only one week left before the RFP closes.
The IT department has put together an RFP evaluation team but no one from the privacy office has
been a Dart of the RFP ud to this point. This occurred deposite the fact….
Which of the following is the least important privacy consideration associated with assessing data
when implementing a large-scale project like this?

  • A. Standardization of privacy safeguards on a national scale.
  • B. Classification of the types of personal information collected by the system
  • C. Identifying operational risks associated with data storage, access and disposal.
  • D. Third-party vendor assessment to determine how well privacy practices of vendors align with your organization's practices.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2