New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Exin PDPF Practice Exam with Questions & Answers | Set: 5

Questions 41

Which option below defines correctly data protection by design (from conception)?

Options:
A.

It’s a methodology of data protection according to its form

B.

It’s a concept that demonstrates the need to protect data since the beginning.

C.

It’s a methodology about how the data should be collected

D.

Only data that is required for processing should be processed

Exin PDPF Premium Access
Questions 42

A person buys a product at a store located in the European Economic Area (EEA). At the time of purchase, you are asked to fill out a registration form and he informs his personal email.

As is usual in many stores, in the next few days this person will start receiving several marketing emails. He considers the frequency of these emails to be very high. Demanding his rights, he asks the store to delete all his personal data.

What the store must do according to the General Data Protection Regulation (GDPR)?

Options:
A.

The owner does not have this right, since he bought a product in the store, he has the right to send emails with new promotions.

B.

The store has 30 days from the date of receipt of the customer’s request to delete all data at no cost to the customer.

C.

The store must delete customer data from its advertising list. Purchase data cannot be deleted, as financial data has to be kept longer.

Questions 43

How are the terms privacy and data protection related?

Options:
A.

Data protection is the right to privacy.

B.

The terms are synonymous.

C.

Privacy includes the right to the protection of personal data.

Questions 44

After notifying the supervisory authority, what should be the first action the controller must take when it finds a security breach where unauthorized people have accessed personal data?

Options:
A.

Contact the DPO for formal notification to the Supervisory Authority.

B.

Analyze whether sensitive data has been accessed.

C.

Register a Police Report at the cybercrime station.

D.

Notify data subjects that have been subject to a security breach.