Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

GDPR PECB Certified Data Protection Officer is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

GDPR Practice Questions

PECB Certified Data Protection Officer

Last Update 6 hours ago
Total Questions : 80

Dive into our fully updated and stable GDPR practice test platform, featuring all the latest General Data Protection Regulation exam questions added this week. Our preparation tool is more than just a PECB study aid; it's a strategic advantage.

Our free General Data Protection Regulation practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about GDPR. Use this test to pinpoint which areas you need to focus your study on.

GDPR PDF

GDPR PDF (Printable)
$262.5
$750

GDPR Testing Engine

GDPR PDF (Printable)
$262.5
$750

GDPR PDF + Testing Engine

GDPR PDF (Printable)
$262.5
$750
Question # 11

Scenario:

Amarketing companydiscovers that anunauthorized party accessed its customer database, exposing5,000 recordscontainingnames, email addresses, and phone numbers. The breach occurred due to amisconfigured server.

Question:

To comply withGDPR, whichinformation must the company includein itsnotification to the supervisory authority?

Options:

A.  

Adescription of the natureof the personal data breach.

B.  

Theapproximate number of data subjectsand records affected.

C.  

Both A and B.

D.  

Theidentity of the attackerand their potential motive.

Discussion 0
Question # 12

Scenario:

ChatBubbleis a software company that stores personal data, includingusernames, emails, and passwords. Last month, an attacker gained access to ChatBubble’s system, but the personal datawas encrypted, preventing unauthorized access.

Question:

Should thedata subjects be notifiedin this case?

Options:

A.  

Yes, the company shall communicateall incidentsregarding personal data to the data subjects.

B.  

No, the company isnot required to notify data subjectsabout a data breach that affects alarge number of individuals.

C.  

No, the company isnot required to notify data subjects when the personal data is protected with appropriate technical and organizational measures.

D.  

Yes, but only if the supervisory authority explicitly requests notification.

Discussion 0
Question # 13

Scenario:

PickFoodis an onlinefood delivery servicethat allows customers to order foodonlineand pay bycredit card. Thepayment serviceis provided byPaySmart, which processes the transactions.

Question:

According toArticle 30 of GDPR, whattype of information should PaySmart NOT maintainwhen recording online transaction processing activity?

Options:

A.  

Thegeneral descriptionof technical data protection measures.

B.  

Theexpected time for personal data erasure.

C.  

Transfers of personal data tothird-party payment processors.

D.  

Alist of customers’ transaction amounts and items purchased.

Discussion 0
Question # 14

Scenario 8:MA store is an online clothing retailer founded in 2010. They provide quality products at a reasonable cost. One thing that differentiates MA store from other online shopping sites is their excellent customer service.

MA store follows a customer-centered business approach. They have created a user-friendly website with well-organized content that is accessible to everyone. Through innovative ideas and services, MA store offers a seamless user experience for visitors while also attracting new customers. When visiting the website, customers can filter their search results by price, size, customer reviews, and other features. One of MA store's strategies for providing, personalizing, and improving its products is data analytics. MA store tracks and analyzes the user actions on its website so it can create customized experience for visitors.

In order to understand their target audience, MA store analyzes shopping preferences of its customers based on their purchase history. The purchase history includes the product that was bought, shipping updates, and payment details. Clients' personal data and other information related to MA store products included in the purchase history are stored in separate databases. Personal information, such as clients' address or payment details, are encrypted using a public key. When analyzing the shopping preferences of customers, employees access only the information about the product while the identity of customers is removed from the data set and replaced with a common value, ensuring that customer identities are protected and cannot be retrieved.

Last year, MA store announced that they suffered a personal data breach where personal data of clients were leaked. The personal data breach was caused by an SQL injection attack which targeted MA store’s web application. The SQL injection was successful since no parameterized queries were used.

Based on this scenario, answer the following question:

Which de-identification method has MA store used when analyzing the shopping preferences of its customers?

Options:

A.  

Differential privacy

B.  

Generalizing data with k-anonymity

C.  

Scrambling

Discussion 0
Question # 15

Bus Spot is one of the largest bus operators in Spain. The company operates in local transport and bus rental since 2009. The success of Bus Spot can be attributed to the digitization of the bus ticketing system, through which clients can easily book tickets and stay up to date on any changes to their arrival or departure time. In recent years, due to the large number of passengers transported daily. Bus Spot has dealt with different incidents including vandalism, assaults on staff, and fraudulent injury claims. Considering the severity of these incidents, the need for having strong security measures had become crucial. Last month, the company decided to install a CCTV system across its network of buses. This security measure was taken to monitor the behavior of the company's employees and passengers, enabling crime prevention and ensuring safety and security. Following this decision, Bus Spot initiated a data protection impact assessment (DPIA). The outcome of each step of the DPIA was documented as follows: Step 1: In all 150 buses, two CCTV cameras will be installed. Only individuals authorized by Bus Spot will have access to the information generated by the CCTV system. CCTV cameras capture images only when the Bus Spot's buses are being used. The CCTV cameras will record images and sound. The information is transmitted to a video recorder and stored for 20 days. In case of incidents, CCTV recordings may be stored for more than 40 days and disclosed to a law enforcement body. Data collected through the CCTV system will be processed bv another organization. The purpose of processing this tvoe of information is to increase the security and safety of individuals and prevent criminal activity. Step 2: All employees of Bus Spot were informed for the installation of a CCTV system. As the data controller, Bus Spot will have the ultimate responsibility to conduct the DPI

A.  

Appointing a DPO at that point was deemed unnecessary. However, the data processor’s suggestions regarding the CCTV installation were taken into account. Step 3: Risk Likelihood (Unlikely, Possible, Likely) Severity (Moderate, Severe, Critical) Overall risk (Low, Medium, High) There is a risk that the principle of lawfulness, fairness, and transparency will be compromised since individuals might not be aware of the CCTV location and its field of view. Likely Moderate Low There is a risk that the principle of integrity and confidentiality may be compromised in case the CCTV system is not monitored and controlled with adequate security measures. Possible Severe Medium There is a risk related to the right of individuals to be informed regarding the installation of CCTV cameras. Possible Moderate Low Step 4: Bus Spot will provide appropriate training to individuals that have access to the information generated by the CCTV system. In addition, it will ensure that the employees of the data processor are trained as well. In each entrance of the bus, a sign for the use of CCTV will be displayed. The sign will be visible and readable by all passengers. It will show other details such as the purpose of its use, the identity of Bus Spot, and its contact number in case there are any queries. Only two employees of Bus Spot will be authorized to access the CCTV system. They will continuously monitor it and report any unusual behavior of bus drivers or passengers to Bus Spot. The requests of individuals that are subject to a criminal activity for accessing the CCTV images will be evaluated only for a limited period of time. If the access is allowed, the CCTV images will be exported by the CCTV system to an appropriate file format. Bus Spot will use a file encryption software to encrypt data before transferring onto another file format. Step 5: Bus Spot's topmanagement has evaluated the DPIA results for the processing of data through CCTV system. The actions suggested to address the identified risks have been approved and will be implemented based on best practices. This DPIA involves the analysis of the risks and impacts in only a group of buses located in the capital of Spain. Therefore, the DPIA will be reconducted for each of Bus Spot's buses in Spain before installing the CCTV system. Based on this scenario, answer the following question:

Question:

Based on scenario 6, Bus Spot decidednot to appoint a DPOwhen conducting the DPI

A.  

Which option iscorrectregarding this situation?

Options:

A.  

Bus Spot can conduct a DPIA without designating a DPO, since the role of the DPO is only to give advice to the controller or processor.

B.  

The DPIA conducted by Bus Spotis not validbecause they have not appointed a DPO.

C.  

Bus Spot can conduct a DPIA only after appointing a DPO, since the DPO needs to control the DPIA process and observe how well risks are addressed.

D.  

A DPO is mandatoryfor Bus Spot because CCTV surveillance involves high-risk processing.

Discussion 0
Question # 16

Question:

To evaluate theeffectiveness of communication, theDPO of Company ABCreviewed theaccuracy and relevanceof the information provided to customers regarding personal data processing.

Is this agood practiceunder GDPR?

Options:

A.  

Yes, when evaluating the effectiveness of communication, theDPO should consider the accuracy and relevanceof the information provided to concerned parties.

B.  

No, the effectiveness of communicationcannot be evaluatedthrough the evaluation of theaccuracy and relevanceof information provided to customers.

C.  

No, the DPO isnot responsiblefor evaluating the effectiveness of communication with customers.

D.  

Yes, but only if the company’ssupervisory authority requests it.

Discussion 0
Question # 17

Question:

According to theprinciple of data minimization, data must be:

Options:

A.  

In a formwhich permits the identification of data subjectsfor no longer than is necessary.

B.  

Acquired only forspecified, explicit, and legitimate purposes.

C.  

Adequate, relevant, and limitedto what is necessary in relation to the purposes of processing.

D.  

Stored forno more than five yearsfrom the date of collection.

Discussion 0
Question # 18

Scenario1:

MED is a healthcare provider located in Norway. It provides high-quality and affordable healthcare services, including disease prevention, diagnosis, and treatment. Founded in 1995, MED is one of the largest health organizations in the private sector. The company has constantly evolved in response to patients' needs.

Patients that schedule an appointment in MED's medical centers initially need to provide theirpersonal information, including name, surname, address, phone number, and date of birth. Further checkups or admission require additional information, including previous medical history and genetic data. When providing their personal data, patients are informed that the data is used for personalizing treatments and improving communication with MED's doctors. Medical data of patients, including children, are stored in the database of MED's health information system. MED allows patients who are at least 16 years old to use the system and provide their personal information independently. For children below the age of 16, MED requires consent from the holder of parental responsibility before processing their data.

MED uses a cloud-based application that allows patients and doctors to upload and access information. Patients can save all personal medical data, including test results, doctor visits, diagnosis history, and medicine prescriptions, as well as review and track them at any time. Doctors, on the other hand, can access their patients' data through the application and can add information as needed.

Patients who decide to continue their treatment at another health institution can request MED to transfer their data. However, even if patients decide to continue their treatment elsewhere, their personal data is still used by ME

D.  

Patients’ requests to stop data processing are rejected. This decision was made by MED’s top management to retain the information of everyone registered in their databases.

The company also shares medical data with InsHealth, a health insurance company. MED's data helps InsHealth create health insurance plans that meet the needs of individuals and families.

MED believes that it is its responsibility to ensure the security and accuracy of patients’ personal data. Based on the identified risks associated with data processing activities, MED has implemented appropriate security measures to ensure that data is securely stored and processed.

Since personal data of patients is stored and transmitted over the internet, MED uses encryption to avoid unauthorized processing, accidental loss, or destruction of data. The company has established a security policy to define the levels of protection required for each type of information and processing activity. MED has communicated the policy and other procedures to personnel and provided customized training to ensure proper handling of data processing.

Question:

Based on scenario 1, which data subject right isNOTguaranteed by MED?

Options:

A.  

Right to be informed

B.  

Right to restriction of processing

C.  

Right to data portability

D.  

Right to rectification

Discussion 0
Question # 19

Scenario1:

MED is a healthcare provider located in Norway. It provides high-quality and affordable healthcare services, including disease prevention, diagnosis, and treatment. Founded in 1995, MED is one of the largest health organizations in the private sector. The company has constantly evolved in response to patients' needs.

Patients that schedule an appointment in MED's medical centers initially need to provide their personal information, including name, surname, address, phone number, and date of birth. Further checkups or admission require additional information, including previous medical history and genetic data. When providing their personal data, patients are informed that the data is used for personalizing treatments and improving communication with MED's doctors. Medical data of patients, including children, are stored in the database of MED's health information system. MED allows patients who are at least 16 years old to use the system and provide their personal information independently. For children below the age of 16, MED requires consent from the holderof parental responsibility before processing their data.

MED uses a cloud-based application that allows patients and doctors to upload and access information. Patients can save all personal medical data, including test results, doctor visits, diagnosis history, and medicine prescriptions, as well as review and track them at any time. Doctors, on the other hand, can access their patients' data through the application and can add information as needed.

Patients who decide to continue their treatment at another health institution can request MED to transfer their data. However, even if patients decide to continue their treatment elsewhere, their personal data is still used by ME

D.  

Patients’ requests to stop data processing are rejected. This decision was made by MED’s top management to retain the information of everyone registered in their databases.

The company also shares medical data with InsHealth, a health insurance company. MED's data helps InsHealth create health insurance plans that meet the needs of individuals and families.

MED believes that it is its responsibility to ensure the security and accuracy of patients’ personal data. Based on the identified risks associated with data processing activities, MED has implemented appropriate security measures to ensure that data is securely stored and processed.

Since personal data of patients is stored and transmitted over the internet, MED uses encryption to avoid unauthorized processing, accidental loss, or destruction of data. The company has established a security policy to define the levels of protection required for each type of information and processing activity. MED has communicated the policy and other procedures to personnel and provided customized training to ensure proper handling of data processing.

Question:

Based on scenario 1, MED shares patients' personal data with a health insurance company. Does MED comply with thepurpose limitation principle?

Options:

A.  

Yes, personal data may be used for purposes in the public interest or statistical purposes in accordance withArticle 89 of GDPR.

B.  

Yes, using personal data for creating health insurance plans is within the scope of the data collection purpose.

C.  

No, personal data should be collected for specified, explicit, and legitimate purposes in accordance withArticle 5 of GDPR.

D.  

Yes, as long as the data is encrypted before sharing.

Discussion 0
Question # 20

Scenario:

Pinky, a retail company,received a requestfrom adata subjectto identify which purchasesthey had madeat differentphysical store locations. However,Pinky does not link purchase records to customer identities, since purchasesdo not require account creation.

Question:

Should Pinkyprocess additional informationfrom customers in order toidentify the data subjectas requested?

Options:

A.  

Yes, Pinky is required tomaintain, acquire, or process additional informationin order to identify the data subject.

B.  

Yes, Pinky is required to process additional information for the purpose ofexercising the data subject’s rightscovered inArticles 15-21 of GDPR.

C.  

No, Pinky isnot requiredto process additional information, since the processing of personal data in this case does not require Pinky toidentify the data subject.

D.  

No, but Pinky must ask the data subject to provide further evidence proving their identity.

Discussion 0
Get GDPR dumps and pass your exam in 24 hours!

Free Exams Sample Questions