Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PDPF Questions and Answers

Question # 6

Important technical requirements set out in the General Data Protection Regulation (GDPR) are about data quality. One is the obligation to ensure appropriate security, including protection against unauthorized or unlawful processing.

What is another important technical requirement?

A.

To ascertain that personal data collection is adequate, relevant and limited to what is necessary in relation to the purposes

B.

To control that data collected for specified, explicit and legitimate purposes is not further processed for other purposes

C.

To keep personal data accurate and up to date, ensuring that inaccurate data are erased or rectified without delay

D.

To make sure that personal data is processed lawfully, fairly and in transparent manner in relation to the data subject

Full Access
Question # 7

When personal data are processed, who is ultimately responsible for demonstrating compliance with the GDPR?

A.

Data protection officer (DPO)

B.

Supervisory authority

C.

Processor

D.

Controller

Full Access
Question # 8

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018, what is the legal status of this regulation?

A.

The GDPR is a functional law in all EU member states and Member States cannot rectify it.

B.

The GDPR is only a recommendation. Member States should create laws to suit

C.

Some articles in the GDPR provide guidance and allow Member States to draft more specific laws to suit.

Full Access
Question # 9

How are the terms privacy and data protection related?

A.

Data protection is the right to privacy.

B.

The terms are synonymous.

C.

Privacy includes the right to the protection of personal data.

Full Access
Question # 10

Which of the options below is classified as a personal data breach under the GDPR?

A.

Personal data processed without the consent of the controller.

B.

A server is attacked and exploited by a hacker.

C.

Data accessed by employees without permission.

D.

Strategic company data is mistakenly shared.

Full Access
Question # 11

The Control Authority may impose fines on organizations that are not meeting the mandatory requirements of the General Data Protection Regulation (GDPR).

A.

False

B.

True

Full Access
Question # 12

In the European Union we have: Directives and Regulations. What is the difference between them?

A.

The regulation provides guidance for EU Member States and they can create their own laws to conform to the regulation. A directive has the force of law and all EU Member States must follow it without changing it.

B.

The directive provides guidance for EU member states and they can create their own laws to suit the directive. A regulation has the force of law and all EU Member States must follow it without changing it.

Full Access
Question # 13

What is the definition of privacy related to the General Data protection Regulation (GDPR)?

A.

A situation in which one is not observed or distributed by the government or uninvited people.

B.

The right to respect for a person’s private and family life, his home and his correspondence.

C.

The fundamental right to respect a person’s physical and mental integrity.

D.

The right to be protected against unsolicited intrusion into a computer or network and the processing of personal data by third parties.

Full Access
Question # 14

What does the principle of ‘data minimization’ mean?

A.

Personal data shall be accurate and where necessary kept up to date.

B.

Personal data shall be adequate and limited to what is necessary for the purposes of the processing.

C.

Personal data shall be processed in a manner that ensures appropriate security of the personal data.

D.

Personal data shall be processed lawfully, fairly and in a transparent manner in relation to the data subject.

Full Access
Question # 15

What is considered a personal data processing for the General Data Protection Regulation (GDPR)?

A.

Analysis of data regarding the cause of death in the last 10 years.

B.

Creating a backup with records of names, addresses, enrollment of students.

C.

Conducting analysis of personal data related to health issues, but which have previously been anonymized.

D.

Statistical publication with intention to vote, help anonymously.

Full Access
Question # 16

A personal data breach has occurred, and the controller is writing a draft notification for the supervisory authority. The following information is already in the notification:

-The nature of the personal data breach and its possible consequences.

-Information regarding the parties that can provide additional information about the data breach.

What other information must the controller provide?

A.

Information of local and national authorities that were informed about the data breach.

B.

Name and contact details of the data subjects whose data may have been breached

C.

Suggested measures to mitigate the adverse consequences of the data breach.

D.

The information needed to access the personal data that have been breached.

Full Access
Question # 17

In what way are online activities of people most effectively used by modern marketers?

A.

By analyzing the logs of the web server it can be seen which products are top sellers, allowing them to optimize their marketing campaigns for those products.

B.

By tagging users of social media, profiles of their online behavior can be created. These profiles are used to ask them to promote a product.

C.

By tagging visitors of web pages, profiles of their online behavior can be created. These profiles are sold and used in targeted advertisement campaigns.

Full Access
Question # 18

We know that when browsing the internet there is a lot of personal data that is collected. One mechanism for collecting this data is cookies.

How do marketers use this collected personal data?

A.

Collecting logs from web servers and running campaigns promoting products on social media.

B.

Collecting the logs from the web servers, they analyze which products are most visited and sold, promoting marketing campaigns for these products.

C.

They create behavioral profiles, applying tags to web page visitors. These profiles can be marketed and used in targeted marketing campaigns.

Full Access
Question # 19

What is the definition of Processor according to GDPR?

A.

Individual or legal entity that is not authorized to process personal data

B.

An independent public authority created by a Member State

C.

Individual or legal entity that processes personal data on behalf of the person responsible for processing personal data.

D.

Individual or legal entity that, individually or in conjunction with others, determines the purposes and means of processing personal data.

Full Access
Question # 20

A company CEO travels to a meeting in another city. He takes a notebook with information about the company’s new projects and acquisitions, which will be the subject of discussion at this meeting. These are the only data stored on the notebook.

The notebook accidentally falls into the hotel’s pool and all data is lost.

What happened, considering the General Data Protection Regulation (GDPR)?

A.

A security incident

B.

A vulnerability

C.

A data breach

D.

A security risk

Full Access
Question # 21

After appearing in a photo posted by a friend on a social network, a person felt embarrassed and decided that he wants the photo to be deleted.

According to the General Data Protection Regulation (GDPR), does that person have the right to delete this photo?

A.

False

B.

True

Full Access
Question # 22

One of the seven principles of data protection by design is Functionality - Positive-Sum, not Zero-Sum. What is the essence of this principle?

A.

If different types of legitimate objectives are contradictory, the privacy objectives must be given priority over other security objectives.

B.

Applied security standards must assure the confidentiality, integrity and availability of personal data throughout their lifecycle.

C.

Wherever possible, detailed privacy impact and risk assessments should be carried out and published, clearly documenting the privacy risks.

D.

When embedding privacy into a given technology, process, or system, it should be done in such a way that full functionality is not impaired.

Full Access