Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Exin PDPF - Privacy and Data Protection Foundation

Page: 2 / 5
Total 149 questions

Important technical requirements set out in the General Data Protection Regulation (GDPR) are about data quality. One is the obligation to ensure appropriate security, including protection against unauthorized or unlawful processing.

What is another important technical requirement?

A.

To ascertain that personal data collection is adequate, relevant and limited to what is necessary in relation to the purposes

B.

To control that data collected for specified, explicit and legitimate purposes is not further processed for other purposes

C.

To keep personal data accurate and up to date, ensuring that inaccurate data are erased or rectified without delay

D.

To make sure that personal data is processed lawfully, fairly and in transparent manner in relation to the data subject

What year did the General Data Protection Regulation (GDPR) come into force?

A.

2016

B.

2018

C.

2017

D.

2019

Which cause is a data breach according to the GDPR?

A.

illegally obtained corporate data from a human resources management system

B.

Personal data is processed without a binding contract.

C.

Personal data is processed by anyone other than the controller, processor or, possibly, subprocessor

D.

The operation of a vulnerable server in the internal network of the processor

What is the legal status of the GDPR?

A.

The GDPR is functional law in all member states of the EEA. Some Articles allow for member states law to provide for more specific rules.

B.

The GDPR sets out minimum conditions and requirements. Member states need to pass national laws to meet these minimum requirements.

C.

The GDPR is a recommendation of the European Commission that EEA countries’ law authorities improve their laws on the protection of personal data.

How should data protection between the processor and controller be regulated in accordance with the General Data Protection Regulation (GDPR)?

A.

Contract

B.

Supervisory Authority endorsement.

C.

Compulsory Corporate Rules.

D.

Standard contractual clauses.

Which of the following options describes the concept of data minimization?

A.

It is the minimization of data storage locations.

B.

It is the decrease in the space allocated for data storage.

C.

It is the limitation of data to the purposes for which it is treated.

D.

It is the use of data for the shortest possible time.

Subcontracting treatment is regulated by contract or other regulatory act under Union or Member State law, which links the processor to the controller.

What this contract or other regulatory act stipulates?

A.

A process for testing, assessing and regularly evaluating the effectiveness of technical and organizational measures to ensure safe treatment.

B.

The processor assists the driver through technical and organizational measures to enable it to fulfill its obligation to respond to requests from data subjects.

C.

The description of categories of data subjects and categories of personal data

D.

The purpose of data processing

In its Article 9 the GDPR categorizes some types of personal data as “sensitive”.

Of these below which are considered sensitive?

A.

Date of birth of a person.

B.

A person’s home address.

C.

Soccer team that a person supports.

D.

Result of a medical examination.

A person is moving from city A to city B, within an EEA member state. In city A he was a patient of the local hospital A. In city B, he becomes a patient of hospital B. The patient has opted out of the national electronic patients file system. The patient asks hospital A to forward his medical file directly to hospital B. According to the GDPR, what is allowed?

A.

The hospital in A can send the medical file to the data subject, but not to another hospital

B.

The hospital in A can send the file to hospital B, before the patient has requested it

C.

The hospital in A can send the data directly to hospital B, as requested by the patient.

D.

The hospital in A cannot send the file, because there is no legitimate ground for processing

One of the seven principles of data protection by design is Functionality - Positive-Sum, not Zero-Sum. What is the essence of this principle?

A.

If different types of legitimate objectives are contradictory, the privacy objectives must be given priority over other security objectives.

B.

Applied security standards must assure the confidentiality, integrity and availability of personal data throughout their lifecycle.

C.

Wherever possible, detailed privacy impact and risk assessments should be carried out and published, clearly documenting the privacy risks.

D.

When embedding privacy into a given technology, process, or system, it should be done in such a way that full functionality is not impaired.