{"id":121086,"date":"2023-10-08T03:38:45","date_gmt":"2023-10-08T03:38:45","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=121086"},"modified":"2023-10-08T03:38:47","modified_gmt":"2023-10-08T03:38:47","slug":"cipp-us-certification-exam-2023-with-100-correct-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/10\/08\/cipp-us-certification-exam-2023-with-100-correct-answers\/","title":{"rendered":"CIPP\/US Certification exam 2023 with100% correct answers"},"content":{"rendered":"\n<p>How many states allow Telephonic Notification? &#8211; correct answer20: Arizona, Colorado, Connecticut,<br>Delaware, Idaho, Indiana, Maryland, Mississippi, Montana, Nebraska, Ohio, Oklahoma, South Carolina,<br>Utah, Virginia, West Virginia.<br>With specific requirements: Michigan, Pennsylvania, Vermont, New York<br>What does substitute notice require? &#8211; correct answer1. Posting on website homepage<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Statewide media posting<\/li>\n\n\n\n<li>E-mail notice when possible<br>What is the threshold for substitute notice in most\/many states? &#8211; correct answerIf the cost would be<br>more than 250K or more than 500K people are affected.<br>What states do not have data breach laws? &#8211; correct answerAlabama, New Mexico, South Dakota<br>How many states do not have Data Destruction Laws? &#8211; correct answer(20) Alabama, Idaho, Iowa,<br>Louisiana, Maine, Mississippi, Missouri, Minnesota, Nebraska, New Hampshire, New Mexico, North<br>Dakota, Ohio, Oklahoma, Pennsylvania, South Dakota, Virginia, West Virginia, Wyoming, DC<br>How many states have state agency notification requirements? &#8211; correct answer(21) California,<br>Connecticut, Florida, Hawaii, Indiana, Iowa, Louisiana, Maine, Maryland, Massachusetts, Missouri,<br>Montana, New Hampshire, New Jersey, New York, North Carolina, South Carolina, Vermont, Virginia,<br>Washington, Puerto Rico<br>How many states require Consumer Reporting Agency notification for data breach? &#8211; correct answer(29)<br>Alaska, Colorado, DC, Florida, Georgia, Hawaii, Indiana, Kansas, Maine, Maryland, Massachusetts,<br>Michigan, Minnesota, Missouri, Nevada, New Hampshire, New Jersey, New York, North Carolina, Ohio,<br>Oregon, Pennsylvania, South Carolina Tennessee, Texas, Vermont, Virginia, West Virginia, Wisconsin<br>How many states that have all of the following: data breach law, data destruction law, requirement to<br>notify state, requirement to notify consumer reporting agency? &#8211; correct answer(9) Florida, Indiana,<br>Maryland, Massachusetts, New Jersey, New York, North Carolina, South Carolina, Vermont<br>What states have private sector data security laws? &#8211; correct answer1. Arkansas<\/li>\n\n\n\n<li>California<\/li>\n\n\n\n<li>Connecticut<\/li>\n\n\n\n<li>Florida<br><\/li>\n\n\n\n<li>Indiana<\/li>\n\n\n\n<li>Kansas<\/li>\n\n\n\n<li>Maryland<\/li>\n\n\n\n<li>Massachusetts<\/li>\n\n\n\n<li>Minnesota<\/li>\n\n\n\n<li>Nevada<\/li>\n\n\n\n<li>Oregon<\/li>\n\n\n\n<li>Rhode Island<\/li>\n\n\n\n<li>Texas<\/li>\n\n\n\n<li>Utah<br>What is Connecticut&#8217;s Data Security Requirement for state contractors? &#8211; correct answerApplies to:<br>Contractors: an individual, business or other entity that is receiving confidential information from a state<br>contracting agency or agent of the state pursuant to a written agreement to provide goods or services to<br>the state.<br>Requires: Implement and maintain a comprehensive data-security program (as specified\/detailed in<br>statute) including encryption of all sensitive personal data transmitted wirelessly or via a public Internet<br>connection, or contained on portable electronic devices has to be encrypted as well.<br>What does Massachusetts&#8217; Data Security Law require? &#8211; correct answer1. Designate head of InfoSec<\/li>\n\n\n\n<li>Anticipate and mitigate risks<\/li>\n\n\n\n<li>Security program rules<\/li>\n\n\n\n<li>Penalties for violations of rules<\/li>\n\n\n\n<li>Prevent access by former employees<\/li>\n\n\n\n<li>Contractually obligate vendors to same or similar procedures<\/li>\n\n\n\n<li>Restrict physical access<\/li>\n\n\n\n<li>Monitor effectiveness of program<\/li>\n\n\n\n<li>Review program at least 1x per year<\/li>\n\n\n\n<li>Document responses to incidents<br>What is the definition of PII under Massachusetts law? &#8211; correct answer&#8221;a Massachusetts resident&#8217;s first<br>name and last name or first initial and last name in combination with any one or more of the following<br>data elements that relate to such resident:<br><br>(a) Social Security number;<br>(b) driver&#8217;s license number or state-issued identification card number; or<br>(c) financial account number, or credit or debit card number, with or without any required security code,<br>access code, personal identification number or password, that would permit access to a resident&#8217;s<br>financial account.&#8221;<br>The Massachusetts Standards exclude from the definition any information lawfully obtained from<br>publicly available information or from government records available to the general public.[2]<br>What are Massachusetts requirements for system security? &#8211; correct answer1. Secure control of user<br>identifiers and passwords for authentication purposes;<\/li>\n\n\n\n<li>Lock-out processes for inactive users or unsuccessful log-in attempts;<\/li>\n\n\n\n<li>Limiting access to personal information to those persons who are reasonably required to know such<br>information;<\/li>\n\n\n\n<li>Up-to-date firewall protection and operating system security patches for systems connected to the<br>Internet;<\/li>\n\n\n\n<li>Up-to-date versions of system security agent software, including malware protection, patches, and<br>virus definitions; and<\/li>\n\n\n\n<li>Education and training of employees on the proper use of the computer security system.[7]<br>Similarities between state data breach laws? &#8211; correct answer1. Definition of personal information<\/li>\n\n\n\n<li>Covered entities<\/li>\n\n\n\n<li>Definition of security breach<\/li>\n\n\n\n<li>Level of harm requiring notification<\/li>\n\n\n\n<li>Whom to notify<\/li>\n\n\n\n<li>When to notify<\/li>\n\n\n\n<li>Contents of notification<\/li>\n\n\n\n<li>How to notify<\/li>\n\n\n\n<li>Exceptions to notify<\/li>\n\n\n\n<li>Penalties and rights of action<br>What is the definition of personal information in Connecticut? &#8211; correct answerFirst name or initial and<br>last name with:<\/li>\n\n\n\n<li>SSN<\/li>\n\n\n\n<li>Driver&#8217;s license or state ID<br><\/li>\n\n\n\n<li>Account number in combination with a security code, password, etc.<br>What states include medical information in definition of personal information? &#8211; correct answer1.<br>Arkansas<\/li>\n\n\n\n<li>California<\/li>\n\n\n\n<li>Missouri<\/li>\n\n\n\n<li>Texas<\/li>\n\n\n\n<li>Virginia<br>What additional information does Oregon and Wyoming include in PII? &#8211; correct answerAny state or<br>federal identification number.<br>Which states include biometric data in the PII definition? &#8211; correct answer1. Iowa<\/li>\n\n\n\n<li>Nebraska<\/li>\n\n\n\n<li>North Carolina<\/li>\n\n\n\n<li>Wisconsin<br>What state includes mother&#8217;s maiden name in PII definition? &#8211; correct answerNorth Dakota<br>What state includes tax information and work evaluations in PII definition? &#8211; correct answerPuerto Rico<br>Which states do not exclude publicly available information from definition of PII? &#8211; correct answer1.<br>Idaho<\/li>\n\n\n\n<li>Louisiana<\/li>\n\n\n\n<li>Michigan<br>What callers are not covered by the DNC registry? &#8211; correct answer1. Political organizations,<\/li>\n\n\n\n<li>Charities calling on own behalf,<\/li>\n\n\n\n<li>Telephone surveyors, or<\/li>\n\n\n\n<li>Companies with which a consumer has an existing business relationship.<br>Who must comply with the Telemarketing Sales Rule (TSR)? &#8211; correct answerThe TSR regulates<br>&#8220;telemarketing&#8221; \u2014 defined in the Rule as &#8220;a plan, program, or campaign . . . to induce the purchase of<br>goods or services or a charitable contribution&#8221; involving more than one interstate telephone call. (The<br>FCC regulates both intrastate and interstate calling.) With some important exceptions, any businesses or<br>individuals that take part in &#8220;telemarketing&#8221; must comply with the TSR. This is true whether, as<br>&#8220;telemarketers,&#8221; they initiate or receive phone calls to or from consumers, or as &#8220;sellers,&#8221; they provide,<br>offer to provide, or arrange to provide goods or services to consumers in exchange for payment. It<br>makes no difference whether a company makes or receives calls using low-tech equipment or the<br>newest technology. Similarly, it makes no difference whether the calls are made from outside the United<br>States; so long as they are made to consumers in the United States. Those making the calls, unless<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>How many states allow Telephonic Notification? &#8211; correct answer20: Arizona, Colorado, Connecticut,Delaware, Idaho, Indiana, Maryland, Mississippi, Montana, Nebraska, Ohio, Oklahoma, South Carolina,Utah, Virginia, West Virginia.With specific requirements: Michigan, Pennsylvania, Vermont, New YorkWhat does substitute notice require? &#8211; correct answer1. Posting on website homepage<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-121086","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/121086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=121086"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/121086\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=121086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=121086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=121086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}