Try 12 Certified Information Privacy Technologist (CIPT) sample questions on privacy engineering, data minimization, security controls, identity, telemetry, and privacy by design.
Certified Information Privacy Technologist (CIPT) preparation focuses on how privacy requirements become technical design choices: minimization, identity, consent, telemetry, access control, retention, security, and privacy by design.
Use these 12 original sample questions for initial self-assessment. They are not official IAPP questions and do not reproduce a live exam.
Verify current certification names, exam policies, and requirements with the IAPP certification page .
Topic: privacy by design
Which design choice best reflects privacy by design?
Best answer: C
Explanation: Privacy by design means privacy requirements are part of architecture, data flows, controls, and product decisions from the start.
Topic: minimization
A mobile app requests location access even though its core function does not require location. What is the best privacy engineering concern?
Best answer: A
Explanation: Privacy engineering should challenge unnecessary collection and align data with a defined purpose.
Topic: retention
What is a strong technical support for retention limits?
Best answer: D
Explanation: Retention requirements are stronger when systems enforce lifecycle rules and record exceptions.
Topic: access control
Which control best supports least privilege for personal data?
Best answer: B
Explanation: Least privilege requires appropriate access, review, and monitoring.
Topic: de-identification
Why is pseudonymization not the same as anonymization?
Best answer: B
Explanation: Pseudonymization reduces direct identifiability but may remain personal data depending on re-identification risk.
Topic: telemetry
A product team wants to collect detailed user telemetry. What should privacy engineering ask first?
Best answer: C
Explanation: Telemetry should be purpose-bound, minimized, protected, and governed through retention and access controls.
Topic: consent implementation
What makes a consent preference center technically useful?
Best answer: A
Explanation: Consent systems must operationalize choices across downstream systems and preserve evidence.
Topic: secure transmission
Why encrypt personal data in transit?
Best answer: D
Explanation: Encryption in transit protects confidentiality during communication but does not replace other privacy controls.
Topic: data mapping
Why do engineers need data-flow maps for privacy work?
Best answer: A
Explanation: Data-flow maps reveal where privacy controls must operate.
Topic: logging
Which logging approach is most privacy-aware?
Best answer: C
Explanation: Logs are useful for security and operations but can become privacy risk if over-collected or under-protected.
Topic: deletion
A user deletion request is approved. Which technical issue most often creates risk?
Best answer: D
Explanation: Privacy engineering must account for distributed data copies and deletion dependencies.
Topic: threat modeling
How does privacy threat modeling help product teams?
Best answer: B
Explanation: Privacy threat modeling extends security thinking to privacy harms and system misuse.