CIPT Exam QuestionsBrowse all questions from this exam

CIPT Exam - Question 61


SCENARIO -

Please use the following to answer the next question:

Looking back at your first two years as the Director of Personal Information Protection and Compliance for the St. Anne's Regional Medical Center in Thorn Bay,

Ontario, Canada, you see a parade of accomplishments, from developing state-of-the-art simulation based training for employees on privacy protection to establishing an interactive medical records system that is accessible by patients as well as by the medical personnel. Now, however, a question you have put off looms large: how do we manage all the data-not only records produced recently, but those still on-hand from years ago? A data flow diagram generated last year shows multiple servers, databases, and work stations, many of which hold files that have not yet been incorporated into the new records system. While most of this data is encrypted, its persistence may pose security and compliance concerns. The situation is further complicated by several long-term studies being conducted by the medical staff using patient information. Having recently reviewed the major Canadian privacy regulations, you want to make certain that the medical center is observing them.

You recall a recent visit to the Records Storage Section in the basement of the old hospital next to the modern facility, where you noticed paper records sitting in crates labeled by years, medical condition or alphabetically by patient name, while others were in undifferentiated bundles on shelves and on the floor. On the back shelves of the section sat data tapes and old hard drives that were often unlabeled but appeared to be years old. On your way out of the records storage section, you noticed a man leaving whom you did not recognize. He carried a batch of folders under his arm, apparently records he had removed from storage.

You quickly realize that you need a plan of action on the maintenance, secure storage and disposal of data.

Which cryptographic standard would be most appropriate for protecting patient credit card information in the records system at St. Anne's Regional Medical

Center?

Show Answer
Correct Answer: AB

Symmetric encryption is the most appropriate cryptographic standard for protecting patient credit card information. It is a well-established method where the same key is used for both encryption and decryption of data. In the context of the medical records system at St. Anne's Regional Medical Center, it ensures that the encrypted data remains secure and compliant with relevant standards such as PCI DSS, which is crucial for handling sensitive information like credit card details. Tokenization, while useful, is not a cryptographic standard and does not encrypt the data itself but rather replaces it with tokens.

Discussion

6 comments
Sign in to comment
nchzhangOption: B
Apr 25, 2022

B is the answer. Tokenization is a form of encryption.

Stants
Feb 29, 2024

The most appropriate cryptographic standard for protecting patient credit card information in the records system at St. Anne’s Regional Medical Center would be B. Tokenization. Tokenization is a process that replaces sensitive data with unique identification symbols (or “tokens”) that retain all the essential information about the data without compromising its security. In the context of credit card information, tokenization can provide a high level of security because even if a token were to be intercepted or stolen, it would be useless to the thief without the original data it represents. This makes tokenization particularly suitable for protecting sensitive data like credit card numbers. It is widely used in the payment industry to reduce the scope of compliance with the Payment Card Industry Data Security Standard (PCI DSS).

k4d4v4rOption: A
Dec 5, 2021

Tokenization is a technique, not a standard. Standards are DES, 3DES, RSA... The only "standard" being mentioned is symmetric encryption

k4d4v4rOption: B
Dec 5, 2021

Found this article... https://www.tokenex.com/blog/tokenization-vs-encryption-which-one-is-best-for-your-business Maybe the question is poorly written

chariot
May 24, 2022

Both are cryptographic data security methods and they essentially have the same function, however they do so with differing processes and have different effects on the data they are protecting.

pipzzOption: A
Jul 11, 2022

They are referring to data at rest here and in this case symmetric encryption can be used as per PCI DSS Guide. If the data was in motion it must be symmetric encryption. https://www.pcidssguide.com/encryption-key-management-essentials/

PaigeH7Option: C
Mar 23, 2024

tokenization ensures that credit card information remains protected while allowing authorized users to perform necessary tasks within the medical records system