Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

PDPF PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PDPF PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Privacy and Data Protection Foundation
  • Last Update: Jul 18, 2025
  • Questions and Answers: 149
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PDPF Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PDPF Practice Exam Questions with Answers Privacy and Data Protection Foundation Certification

Question # 6

Which of the following conflicts with the principle of limiting the purposes?

A.

The data is sold to another company without the consent of the data subject.

B.

Adapt the data to the purpose of the treatment.

C.

Store the data in a way that allows the identification of the data subjects.

D.

Data is used in an obscure manner to the data subject.

Full Access
Question # 7

Racial or ethnic origin, political opinions, religious or philosophical beliefs, or union membership, as well as the processing of genetic data, biometric data, health data or data relating to a person’s sexual life or sexual orientation.

What does this sentence above refer to?

A.

Available personal data categories.

B.

Rights categories of data subjects.

C.

Categories of purposes for the processing of personal data.

D.

Personal data categories.

Full Access
Question # 8

A controller wants to switch processors. What is necessary to review before making this change, so that it remains GDPR compliant?

A.

The matrix location of this new processor.

B.

Require the old processor to erase data.

C.

Require the old processor to port the data.

D.

Verify that the new processor has sufficient security guarantees.

Full Access
Question # 9

The General Data Protection Regulation (GDPR) is based on the principles of proportionality and subsidiarity.

What is the meaning of “proportionality” in this context?

A.

Personal data can be processed according to the use of requirements.

B.

Personal data cannot be reused without explicit and informed consent.

C.

Personal data can only be processed if there are no other means to achieve the purposes.

D.

Personal data must be adequate, relevant and not excessive in relation to the purposes.

Full Access
Question # 10

What is a description of data protection by design and by default?

A.

Not holding more data than is strictly required for processing

B.

An indication of timeframes if processing relates to erasure

C.

Data may only be collected for explicit and legitimate purposes

D.

An approach that implements data protection from the start (Correct)

Full Access
Question # 11

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018, what is the legal status of this regulation?

A.

The GDPR is a functional law in all EU member states and Member States cannot rectify it.

B.

The GDPR is only a recommendation. Member States should create laws to suit

C.

Some articles in the GDPR provide guidance and allow Member States to draft more specific laws to suit.

Full Access
Question # 12

Who should ask for an opinion after conducting an impact assessment on the protection of personal data (DPIA)?

A.

DPO

B.

Controller

C.

Supervisory Authority

D.

Processor

Full Access
Question # 13

A personal data breach has occurred, and the controller is writing a draft notification for the supervisory authority. The following information is already in the notification:

-The nature of the personal data breach and its possible consequences.

-Information regarding the parties that can provide additional information about the data breach.

What other information must the controller provide?

A.

Information of local and national authorities that were informed about the data breach.

B.

Name and contact details of the data subjects whose data may have been breached

C.

Suggested measures to mitigate the adverse consequences of the data breach.

D.

The information needed to access the personal data that have been breached.

Full Access
Question # 14

When a data breach occurs in a company that has branches in several countries of the European Union, which supervisory authority is competent to take the appropriate measures?

A.

The Supervisory Authority of the country where the company’s main establishment is located.

B.

The Supervisory Authority of the country where the subsidiary with the largest number of affected holders

is located.

C.

The Supervisory Authority of the country that had the most affected holders.

D.

The Supervisory Authority of the country where the company’s largest subsidiary is located.

Full Access
Question # 15

In the European Union we have: Directives and Regulations. What is the difference between them?

A.

The regulation provides guidance for EU Member States and they can create their own laws to conform to the regulation. A directive has the force of law and all EU Member States must follow it without changing it.

B.

The directive provides guidance for EU member states and they can create their own laws to suit the directive. A regulation has the force of law and all EU Member States must follow it without changing it.

Full Access
Question # 16

What is the main difference between Directive 95/46 / EC and the General Data Protection Regulation (GDPR)?

A.

The GDPR offers guidance for EU Member States and can create their own laws to comply with the regulation. Directive 95/46 / EC has the force of law and all EU Member States must follow it without changing.

B.

Directive 95/46 / EC offers guidance for EU Member States and can create their own laws to suit the directive. The GDPR has the force of law and all EU Member States must follow it without changing it.

Full Access
Question # 17

While paying with a credit card, the card is skimmed (i.e. the data on the magnetic strip is stolen). The magnetic strip contains the account number, expiration date, cardholder’s name and address, PIN number and more.

What kind of a data breach is this?

A.

Material

B.

Non-material

C.

Verbal

Full Access
Question # 18

The GDPR does not define privacy as a term but uses the concept implicitly throughout the text. What is a correct definition of privacy as implicitly used throughout the GDPR?

A.

The right to respect for one’s private and family life, home and personal correspondence

B.

The right not to be disturbed by uninvited people, nor being followed, spied on or monitored

C.

The fundamental right to protection of personal data, regardless of how it was obtained

D.

The right to freedom of opinion and expression and to seeking, receiving and imparting information

Full Access
Question # 19

What is the main reason for performing data protection by design (from conception)?

A.

Develop technical measures for the protection of personal data.

B.

Enable better marketing campaigns targeted at customers.

C.

Collect as much data as possible for data processing.

D.

Reduce the risk of not meeting legal obligations.

Full Access
Question # 20

A Belgian company has their headquarters in France for tax purposes. They enter into a legally binding contract with a processor in the Netherlands for the processing of personal data of data subjects with various nationalities. A personal data breach occurs. The supervisory authorities start an investigation. Why is the French supervisory authority seen as the lead supervisory authority?

A.

Because the company has their headquarters in France

B.

Because France is located in the middle of Europe

C.

Because France is the largest of the three EEA countries

Full Access
Question # 21

Which of the following has a data breach under the General Data Protection Regulation (GDPR)?

A.

A processor, after terminating its contract with the controller, deletes personal data.

B.

A collaborator goes away without locking his workstation.

C.

A backup is restored by the controller to a corrupted personal data server.

D.

A notebook with financial reports from a multinational is stolen.

Full Access
Question # 22

How is Data Lifecycle Management (DLM) related to data protection?

A.

The DLM makes it possible to create a profile of the data subject.

B.

DLM manages the data flow throughout its life cycle.

C.

DLM makes it possible to know the risks and plans how to mitigate them.

Full Access
Question # 23

According to the GDPR, what is a task of a supervisory authority?

A.

Investigate security breaches of corporate information

B.

Implement technical and organizational measures to ensure compliance

C.

Monitor and enforce the application of the GDPR

Full Access
Question # 24

When personal data are processed, who is ultimately responsible for demonstrating compliance with the GDPR?

A.

Data protection officer (DPO)

B.

Supervisory authority

C.

Processor

D.

Controller

Full Access
Question # 25

A company’s director’s notebook is accidentally wet, which permanently damages the equipment so that it cannot recover its data.

The lost data concerned the financial reports of the company. What happened in this case according to GDPR?

A.

A vulnerability

B.

A threat

C.

A security incident

D.

A data violation

Full Access
Question # 26

According to the principle of purpose limitation, data should not be processed beyond the legitimate purpose defined. However, further processing is allowed in a few specific cases, provided that appropriate safeguards for the rights and freedoms of the data subjects are taken. For which purpose is further processing not allowed?

A.

For archiving purposes in the public interest

B.

For generalized statistical purposes

C.

For scientific or historical research purposes

D.

For direct marketing and commercial purposes

Full Access
Question # 27

The Supervisory Authority is notified whenever an organization intends to process personal data, except for some specific situations. The Supervisory Authority keeps a publicly accessible register of these data processing operations.

What else is a legal obligation of the Supervisory Authority in reaction to such a notification?

A.

To assess compliance with the law in all classes where sensitive personal data is processed

B.

To assess the legitimacy of operations that involve specific risks for the data subjects

C.

To assess the legitimacy of binding contract(s) between the controller and the data processor(s)

D.

To give out a license for the data processing, specifying the types of personal data which are allowed

Full Access
Question # 28

One of the seven principles of data protection by design is Functionality - Positive-Sum, not Zero-Sum. What is the essence of this principle?

A.

If different types of legitimate objectives are contradictory, the privacy objectives must be given priority over other security objectives.

B.

Applied security standards must assure the confidentiality, integrity and availability of personal data throughout their lifecycle.

C.

Wherever possible, detailed privacy impact and risk assessments should be carried out and published, clearly documenting the privacy risks.

D.

When embedding privacy into a given technology, process, or system, it should be done in such a way that full functionality is not impaired.

Full Access
Question # 29

In the GDPR, some types of personal data are regarded as special category personal data. Which personal data are considered special category personal data?

A.

An address list of members of a political party

B.

A genealogical register of someone’s ancestors

C.

A list of payments made using a credit card

Full Access
Question # 30

According to the GDPR, in what situation must data subjects always be notified of a personal data breach?

A.

When personal data is processed at a facility of the processor that is not located within the borders of the EEA

B.

When personal data is processed by a party that agreed to the draft processing contract but has not yet signed it

C.

When the system on which the personal data is processed is attacked causing damage to its storage devices

D.

When there is a significant probability that the breach will lead to a high risk for the privacy of the data subjects

Full Access
Question # 31

Someone regularly receives offers from a store where he purchased something five years ago. He wants the company to stop sending offers and to wipe his personal data.

Which aspect of the rights of a data subject in the General Data Protection Regulation (GDPR) requires the company to comply?

A.

The right to erasure

B.

The right to rectification

C.

The right to restriction of processing

D.

The right to withdraw consent

Full Access
Question # 32

The GDPR contains several items. Which of these contains mandatory requirements?

A.

Recitals

B.

Articles

Full Access
Question # 33

Organizations are obliged to keep a number of records to demonstrate compliance with the GDPR. Which record is not obligatory according to the GDPR?

A.

A record of notifications sent to the supervisory authority regarding processing of personal data

B.

A record of all intended processing together with the processing purpose(s) and legal justifications

C.

A record of processors including personal data provided and the period this data can be retained

D.

A record of data breaches with all relevant characteristics, including notifications

Full Access
Question # 34

A controller asks a processor to produce a report containing customers who have purchased a particular product more than once in the past 6 months.

The processor provides services to several companies (which in this case are the controllers).

When generating the requested report, it uses customer data collected by another controller, that is, for a different purpose.

Fortunately, the error is noticed in time, the report is not sent, and nobody has had access to this data. In this case, how does the processor need to proceed and what action should the controller take?

A.

The processor notifies the Supervisory Authority that a violation has occurred. The controller will be notified and must perform a Data Protection Impact Assessment (DPIA).

B.

The processor needs to notify the controller. And the controller can assess whether there were risks to the data subjects.

C.

The processor needs to notify the controller so that the controller notifies the Supervisory Authority of the personal data breach.

D.

As the error was noticed in time and the report was not sent, there is no need for the processor to inform the controller. The processor must delete the wrong report and generate a new one, this time with the correct data.

Full Access
Question # 35

The GDPR states that records of processing activities must be kept by the controller. To whom must the controller make these records available, if requested?

A.

The data processor

B.

The Data Protection Officer

C.

The European Commission

D.

The supervisory authority

Full Access
Question # 36

Some data processing falls outside of the material scope of the GDPR. What type of processing is not subject to the GDPR?

A.

Creating a back-up of biometric data for data security purposes

B.

Collecting name and address information for a gymnastics club

C.

Editing personal photographs before printing them at home

Full Access
Question # 37

Who is responsible for demonstrating the compliance of personal data processing with the General Data Protection Regulation (GDPR)?

A.

The Data Protection Officer (DPO)

B.

The processor

C.

The controller

D.

The supervisory authority

Full Access
Question # 38

According to the GDPR, what is a mandatory topic in a DPIA report?

A.

Systematic description of the fiduciary duties to ensure compliance to all relevant laws and regulations

B.

An assessment of the necessity and proportionality of the processing operations in relation to the purposes

C.

The documentation of the risks to the rights and freedoms of the data protection officer

D.

The measures envisaged to address the privacy compliance frameworks risks

Full Access
Question # 39

What is the main purpose of cookies?

A.

Identify user preferences, identify the user and it can also save login to a website.

B.

Save the browser history, making it easier for the user to access the page again in the future.

C.

Display advertisements directed to the user, using information collected from the browser.

D.

Infect computers so that unsolicited advertisements are displayed in the browser.

Full Access
Question # 40

How are the terms privacy and data protection related?

A.

Data protection is the right to privacy.

B.

The terms are synonymous.

C.

Privacy includes the right to the protection of personal data.

Full Access
Question # 41

The GDPR refers to the principles of proportionality and subsidiarity. What is the meaning of subsidiarity in this context?

A.

Personal data may only be processed when there are no other means to achieve the purposes.

B.

Personal data cannot be reused without explicit and informed consent.

C.

Personal data can only be processed in accordance with the purpose specification.

D.

Personal data must be adequate, relevant and not excessive in relation to the purposes.

Full Access
Question # 42

Which of the options below best represents data protection by design?

A.

It aims to incorporate security measures to protect data from the moment it is collected, throughout the processing and until its destruction at the end of the process

B.

It aims to ensure that personal data is automatically part of a protection process.

C.

It aims to create privacy impact analysis procedures (DPIA), notifications of breaches of privacy and fulfil requests from data subjects.

Full Access
Question # 43

The Control Authority may impose fines on organizations that are not meeting the mandatory requirements of the General Data Protection Regulation (GDPR).

A.

False

B.

True

Full Access
Question # 44

A person finds that a private videotape showing her in a very intimate situation has been published on a website. She never consented to publication and demands that the video is being removed without undue delay.

According to the GDPR, what should be done next?

A.

Nothing. The video may be regarded as ‘news’ and, therefore, the website is only exercising its right to freedom of expression and information.

B.

The controller erases the video from the website and, when possible, informs any controller who might

process the same video, that it must be erased.

C.

The controller erases the video from the website. There is no obligation however, to inform others who might have copied it, that it should be erased.

D.

The controller directs the person to seek a lawyer and informs that he cannot exclude before a juridical authorization.

Full Access