Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Privacy and Data Protection Foundation Question and Answers

Privacy and Data Protection Foundation

Last Update May 18, 2024
Total Questions : 149

We are offering FREE PDPF Exin exam questions. All you do is to just go and sign up. Give your details, prepare PDPF free exam questions and then go for complete pool of Privacy and Data Protection Foundation test questions that will help you more.

PDPF pdf

PDPF PDF

$35  $99.99
PDPF Engine

PDPF Testing Engine

$42  $119.99
PDPF PDF + Engine

PDPF PDF + Testing Engine

$56  $159.99
Questions 1

According to the GDPR, for which situations should a Data Protection Impact Assessment (DPIA) be conducted?

Options:

A.  

For all projects that include technologies or processes that require data protection

B.  

For all sets of similar processing operations with comparable risks

C.  

For any situation where technologies and processes will be subject to a risk assessment

D.  

For technologies and processes that are likely to result in a high risk to the rights of data subjects

Discussion 0
Questions 2

What is the term used in the General Data Protection Regulation (GDPR) for the disclosure of, or unauthorized access to, personal data?

Options:

A.  

Security incident

B.  

Incident

C.  

Breach of confidentiality

D.  

Data breach

Discussion 0
Questions 3

Which of the options below best represents data protection by design?

Options:

A.  

It aims to incorporate security measures to protect data from the moment it is collected, throughout the processing and until its destruction at the end of the process

B.  

It aims to ensure that personal data is automatically part of a protection process.

C.  

It aims to create privacy impact analysis procedures (DPIA), notifications of breaches of privacy and fulfil requests from data subjects.

Discussion 0
Questions 4

Some data processing falls outside of the material scope of the GDPR. What type of processing is not subject to the GDPR?

Options:

A.  

Creating a back-up of biometric data for data security purposes

B.  

Collecting name and address information for a gymnastics club

C.  

Editing personal photographs before printing them at home

Discussion 0
Questions 5

According to the GDPR, in what situation must data subjects always be notified of a personal data breach?

Options:

A.  

When personal data is processed at a facility of the processor that is not located within the borders of the EEA

B.  

When personal data is processed by a party that agreed to the draft processing contract but has not yet signed it

C.  

When the system on which the personal data is processed is attacked causing damage to its storage devices

D.  

When there is a significant probability that the breach will lead to a high risk for the privacy of the data subjects

Discussion 0
Questions 6

Personal data as defined in the GDPR can be divided into several types. One of these types is described: Data that directly or indirectly reveal someone’s racial or ethnic background, political, philosophical, religious views, union affiliation and data related to health or sex life and sexual orientation. What type of personal data is this?

Options:

A.  

Direct personal data

B.  

Indirect personal data

C.  

Pseudonymized data

D.  

Special category personal data

Discussion 0
Questions 7

What is the main use of a persistent cookie?

Options:

A.  

To save the pages a user has bookmarked in the user’s browser history

B.  

To record every keystroke made by a computer user to find out passwords

C.  

To ensure that the user’s personal data are stored securely on the server

D.  

To personalize the user’s experience of the website during the next visit

Discussion 0
Questions 8

After appearing in a photo posted by a friend on a social network, a person felt embarrassed and decided that he wants the photo to be deleted.

According to the General Data Protection Regulation (GDPR), does that person have the right to delete this photo?

Options:

A.  

False

B.  

True

Discussion 0
Questions 9

In the contract between the controller and processor for the processing of personal data, which of the options below represents the sole responsibility of the Controller?

Options:

A.  

Erase all personal data after the completion of treatment-related services, deleting existing copies.

B.  

Treat personal data only through documented instructions, including with regard to data transfers to third countries or international organizations.

C.  

Ensure that the persons authorized to process personal data have made a commitment to confidentiality.

D.  

Apply technical and organizational measures to ensure that only personal data that are necessary for each specific purpose of processing are processed.

Discussion 0
Questions 10

In the GDPR, some types of personal data are regarded as special category personal data. Which personal data are considered special category personal data?

Options:

A.  

An address list of members of a political party

B.  

A genealogical register of someone’s ancestors

C.  

A list of payments made using a credit card

Discussion 0
Questions 11

Racial or ethnic origin, political opinions, religious or philosophical beliefs, or union membership, as well as the processing of genetic data, biometric data, health data or data relating to a person’s sexual life or sexual orientation.

What does this sentence above refer to?

Options:

A.  

Available personal data categories.

B.  

Rights categories of data subjects.

C.  

Categories of purposes for the processing of personal data.

D.  

Personal data categories.

Discussion 0
Questions 12

The General Data Protection Regulation (GDPR) is related to the protection of personal data. What is the definition of personal data?

Options:

A.  

Preservation of confidentiality, integrity and availability of information

B.  

Any information regarding an identified or identifiable natural person

C.  

Any information that European citizens want to protect

D.  

Data that directly or indirectly reveals racial or ethnic origins, someone’s religious views, and their data related to sexual health and habits

Discussion 0
Questions 13

What is a description of data protection by design and by default?

Options:

A.  

Not holding more data than is strictly required for processing

B.  

An indication of timeframes if processing relates to erasure

C.  

Data may only be collected for explicit and legitimate purposes

D.  

An approach that implements data protection from the start (Correct)

Discussion 0
Questions 14

The General Data Protection Regulation (GDPR) in its Article 30 legislates on the Records of treatment activities.

If requested, the controller must provide these records:

Options:

A.  

To the data processor

B.  

To the Data Protection Officer (DPO)

C.  

The supervisory authority

D.  

To the European Commission

Discussion 0
Questions 15

Which situation is considered a data breach according to the GDPR?

Options:

A.  

A processor deletes personal data after his contract with the controller expired.

B.  

A processor leaves his computer unattended, where colleagues may be able to access it.

C.  

After a disk crash a processor restores personal data from a recent back-up.

D.  

After processing a processor deletes personal data on instruction of the controller.

Discussion 0
Questions 16

Subcontracting treatment is regulated by contract or other regulatory act under Union or Member State law, which links the processor to the controller.

What this contract or other regulatory act stipulates?

Options:

A.  

A process for testing, assessing and regularly evaluating the effectiveness of technical and organizational measures to ensure safe treatment.

B.  

The processor assists the driver through technical and organizational measures to enable it to fulfill its obligation to respond to requests from data subjects.

C.  

The description of categories of data subjects and categories of personal data

D.  

The purpose of data processing

Discussion 0
Questions 17

A person who works for a union took home a draft newsletter to finish it. The thumb drive containing the draft and contact list has been lost. To whom, among others, this data breach should be reported?

Options:

A.  

To all members of the contact list

B.  

To the Union staff

C.  

To the police

Discussion 0
Questions 18

The Control Authority may impose fines on organizations that are not meeting the mandatory requirements of the General Data Protection Regulation (GDPR).

Options:

A.  

False

B.  

True

Discussion 0
Questions 19

For processing of personal data to be legal, a number of requirements must be fulfilled.

What is a requirement for lawful personal data processing?

Options:

A.  

A ‘code of conduct’, describing what the processing exactly entails, must be in place.

B.  

The data subject must have given consent, prior to the processing to begin.

C.  

The processing must be reported to and allowed by the Data Processing Authority

D.  

There must be a legitimate ground for the processing of personal data.

Discussion 0
Questions 20

According to the General Data Protection Regulation (GDPR), which category of personal data is considered to be sensitive data?

Options:

A.  

Labor union association

B.  

Passport number

C.  

Credit card details

D.  

Social security number

Discussion 0
Questions 21

Personal data can be transferred outside of the EEA. According to the GDPR, which transfers outside the EEA are always lawful?

Options:

A.  

Transfers based on the laws of the non-EEA country concerns

B.  

Transfers falling under World Trade Organization rules

C.  

Transfers governed by approved binding corporate rules (BCR)

D.  

Transfers within a global corporation or organization

Discussion 0
Questions 22

A controller wants to outsource processing of personal data to a processor. What must be done before outsourcing?

Options:

A.  

The processor must show the controller that all demands agreed in the service level agreement (SLA) are met.

B.  

The controller and processor must draft and sign a written contract guaranteeing the confidentiality of the data.

C.  

The controller must ask the supervisory authority for permission to outsource the processing of the data.

D.  

The controller must ask the supervisory authority if the agreed written contract is compliant with the regulations.

Discussion 0