Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 24 questions
Exam Code: GDPR                Update: Oct 16, 2025
Exam Name: PECB Certified Data Protection Officer

PECB PECB Certified Data Protection Officer GDPR Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Scenario5:

Recpond is a German employment recruiting company. Their services are delivered globally and include consulting and staffing solutions. In the beginning. Recpond provided its services through an office in Germany. Today, they have grown to become one of the largest recruiting agencies,providing employment to more than 500,000 people around the world. Recpond receives most applications through its website. Job searchers are required to provide the job title and location. Then, a list of job opportunities is provided. When a job position is selected, candidates are required to provide their contact details and professional work experience records. During the process, they are informed that the information will be used only for the purposes and period determined by Recpond. Recpond's experts analyze candidates' profiles and applications and choose the candidates that are suitable for the job position. The list of the selected candidates is then delivered to Recpond's clients, who proceed with the recruitment process. Files of candidates that are not selected are stored in Recpond's databases, including the personal data of candidates who withdraw the consent on which the processing was based. When the GDPR came into force, the company was unprepared. The top management appointed a DPO and consulted him for all data protection issues. The DPO, on the other hand, reported the progress of all data protection activities to the top management. Considering the level of sensitivity of the personal data processed by Recpond, the DPO did not have direct access to the personal data of all clients, unless the top management deemed it necessary. The DPO planned the GDPR implementation by initially analyzing the applicable GDPR requirements. Recpond, on the other hand, initiated a risk assessment to understand the risks associated with processing operations. The risk assessment was conducted based on common risks that employment recruiting companies face. After analyzing different risk scenarios, the level of risk was determined and evaluated. The results were presented to the DPO, who then decided to analyze only the risks that have a greater impact on the company. The DPO concluded that the cost required for treating most of the identified risks was higher than simply accepting them. Based on this analysis, the DPO decided to accept the actual level of the identified risks. After reviewing policies and procedures of the company. Recpond established a new data protection policy. As proposed by the DPO, the information security policy was also updated. These changes were then communicated to all employees of Recpond.Based on this scenario, answer the following question:

Question:

Recpondstores files of candidates who are not selectedin its databases,even if they withdraw consent. Is this acceptable under GDPR?

A.

No, the GDPR requires the controller to erase personal data if the data subject withdraws their consent for data processing.

B.

Yes, the GDPR only requires the controller tostop processing the datawhen consent is withdrawn but does not require its deletion.

C.

Yes, the GDPR allows personal data to be processedeven after consent is withdrawnso organizations can use the data for future recruitment opportunities.

D.

No, Recpond must retain candidate data for statistical analysis but must anonymize it.

Question # 2

Question:

Which of the followingscenarios does NOT require conducting a DPIA?

A.

When an organizationprocesses datato comply withlegal obligationsunder applicable Union law.

B.

When ahospital collects and processes genetic and health dataof its patients.

C.

When an organizationcollects public social media profilesfor ad personalization.

D.

When an organizationinstalls AI-driven video analyticsto track employees’ work patterns.

Question # 3

Scenario:

An organization suffered apersonal data breachdue to aphishing emailattack, which allowed attackers to access employee names, email addresses, and phone numbers.

Question:

What could theDPO do to preventa similar breach from happening again?

A.

Provide training and awareness sessionson data protection within the organization.

B.

Classify incidents into categoriesand take decisions based on this categorization.

C.

Create a data breach response planthat includes information onhow breaches should behandled.

D.

Both A and C.

Question # 4

Scenario 9:Soin is a French travel agency with the largest network of professional travel agents throughout Europe. They aim to create unique vacations for clients regardless of the destinations they seek. The company specializes in helping people find plane tickets, reservations at hotels, cruises, and other activities.

As any other industry, travel is no exception when it comes to GDPR compliance. Soin was directly affected by the enforcement of GDPR since its main activities require the collection and processing of customers’ data. Data collected by Soin includes customer's ID or passport details, financial and payment information, and contact information. This type of data is defined as personal by the GDPR; hence, Soin's data processing activities are built based on customer's consent.

At the beginning, as for many other companies, GDPR compliance was a complicated issue for Soin. However, the process was completed within a few months and later on the company appointed a DPO. Last year, the supervisory authority of France, requested the conduct of a data protection external audit in Soin without an early notice. To ensure GDPR compliance before an external audit was conducted, Soin organized an internal audit. The data protection internal audit was conducted by the DPO of the company. The audit was initiated by firstly confirming the accuracy of records related to all current Soin's data processing activities. The DPO considered that verifying compliance to Article 30 of GDPR would help in defining the data protection internal audit scope. The DPO noticed that not all processing activities of Soin were documented as required by the GDPR. For example, processing activities records of the company did not include a description of transfers of personal data to third countries. In addition, there was no clear description of categories of personal data processed by the company. Other areas that were audited included content of data protection policy, data retention guidelines, how sensitive data is stored, and security policies and practices. The DPO conducted interviews with some employees at different levels of the company. During the audit, the DPO came across some emails sent by Soin's clients claiming that they do not have access in their personal data stored by Soin. Soin's Customer Service Department answered the emails saying that, based on Soin's policies, a client cannot have access to personal data stored by the company. Based on the information gathered, the DPO concluded that there was a lack of employee awareness on the GDPR.

All these findings were documented in the audit report. Once the audit was completed, the DPO drafted action plans to resolve the nonconformities found. Firstly, the DPO created a new procedure which could ensure the right of access to clients. All employees were provided with GDPR compliance awareness sessions. Moreover, the DPO established a document which described the transfer of personal data to third countries and the applicability of safeguards when this transfer is done to an international organization.

Based on this scenario, answer the following question:

Can the DPO appointed by Soin carry out the data protection external audit requested by the supervisory authority?

A.

No, data protection external audits should be conducted by independent auditors who are not part of the company being audited

B.

Yes, data protection external audits should be conducted by auditors contracted by Soin who can be employees of the company

C.

Yes, Soin’s DPO is allowed to conduct a data protection external audit but only if requested by the supervisory authority

Question # 5

Scenario:2

Soyled is a retail company that sells a wide range of electronic products from top European brands. It primarily sells its products in its online platforms (which include customer reviews and ratings), despite using physical stores since 2015. Soyled's website and mobile app are used by millions of customers. Soyled has employed various solutions to create a customer-focused ecosystem and facilitate growth. Soyled uses customer relationship management (CRM) software to analyze user data and administer the interaction with customers. The software allows the company to store customer information, identify sales opportunities, and manage marketing campaigns. It automatically obtains information about each user's IP address and web browser cookies. Soyled also uses the software to collect behavioral data, such as users’ repeated actions and mouse movement information. Customers must create an account to buy from Soyled’s online platforms. To do so, they fill out a standard sign-up form of three mandatory boxes (name, surname, email address) and a non-mandatory one (phone number). When the user clicks the email address box, a pop-up message appears as follows: “Soyled needs your email address to grant you access to your account and contact you about any changes related to your account and our website. For further information, please read our privacy policy.' When the user clicks the phone number box, the following message appears: “Soyled may use your phone number to provide text updates on the order status. The phone number may also be used by the shipping courier." Once the personal data is provided, customers create a username and password, which are used to access Soyled's website or app. When customers want to make a purchase, they are also required to provide their bank account details. When the user finally creates the account, the following message appears: “Soyled collects only the personal data it needs for the following purposes: processing orders, managing accounts, and personalizing customers' experience. The collected data is shared with our network and used for marketing purposes." Soyled uses personal data to promote sales and its brand. If a user decides to close the account, the personal data is still used for marketing purposes only. Last month, the company received an email from John, a customer, claiming that his personal data was being used for purposes other than those specified by the company. According to the email, Soyled was using the data for direct marketing purposes. John requested details on how his personal data was collected, stored, and processed. Based on this scenario, answer the following question:

Scenario:

Soyled's customers are required to provide theirbank account detailsto buy a product. According to the GDPR, is this data processing lawful?

A.

Yes, because the processing is necessary for the fulfillment of the purchase agreement.

B.

Yes, because Soyled has a privacy policy in place that ensures the protection of personal data.

C.

No, sensitive data, such as bank account details, should only be processed by official authorities.

D.

No, because financial information cannot be collected without explicit consent.

Question # 6

Question:

Organization XYZ has just appointed aDPO. As such, XYZ needs toestablish the DPO's rolein the employment contract.

Which of the statements belowholds true?

A.

The DPO acts as acontact pointbetween thesupervisory authoritiesand the controller.

B.

The DPO acts as acontact pointbetween thecontroller and the processor.

C.

The DPO acts as acontact pointbetween the organization’stop management and employees.

D.

The DPO acts as adecision-makeron all data processing activities.

Question # 7

When pseudonymization is used in a dataset, the data is divided into restricted access data and non-identifiable data. This restricted access data includes gender, occupation, and age, whereas the non-identifiable data includes only nationality. Is this correct?

A.

Yes, when pseudonymization is used, non-identifiable data includes only nationality, whereas restricted access data includes gender, occupation, and age

B.

No, non-identifiable data includes gender, nationality, and occupation, whereas restricted access data includes first name, last name, and age, among others

C.

No, only anonymization can be used to divide a dataset into restricted access data and non-identifiable data

Question # 8

Scenario:

Amarketing companydiscovers that anunauthorized party accessed its customer database, exposing5,000 recordscontainingnames, email addresses, and phone numbers. The breach occurred due to amisconfigured server.

Question:

To comply withGDPR, whichinformation must the company includein itsnotification to the supervisory authority?

A.

Adescription of the natureof the personal data breach.

B.

Theapproximate number of data subjectsand records affected.

C.

Both A and B.

D.

Theidentity of the attackerand their potential motive.

Question # 9

Bus Spot is one of the largest bus operators in Spain. The company operates in local transport and bus rental since 2009. The success of Bus Spot can be attributed to the digitization of the bus ticketing system, through which clients can easily book tickets and stay up to date on any changes to their arrival or departure time. In recent years, due to the large number of passengers transported daily. Bus Spot has dealt with different incidents including vandalism, assaults on staff, and fraudulent injury claims. Considering the severity of these incidents, the need for having strong security measures had become crucial. Last month, the company decided to install a CCTV system across its network of buses. This security measure was taken to monitor the behavior of the company's employees and passengers, enabling crime prevention and ensuring safety and security. Following this decision, Bus Spot initiated a data protection impact assessment (DPIA). The outcome of each step of the DPIA was documented as follows: Step 1: In all 150 buses, two CCTV cameras will be installed. Only individuals authorized by Bus Spot will have access to the information generated by the CCTV system. CCTV cameras capture images only when the Bus Spot's buses are being used. The CCTV cameras will record images and sound. The information is transmitted to a video recorder and stored for 20 days. In case of incidents, CCTV recordings may be stored for more than 40 days and disclosed to a law enforcement body. Data collected through the CCTV system will be processed bv another organization. The purpose of processing this tvoe of information is to increase the security and safety of individuals and prevent criminal activity. Step2: All employees of Bus Spot were informed for the installation of a CCTV system. As the data controller, Bus Spot will have the ultimate responsibility to conduct the DPIA. Appointing a DPO at that point was deemed unnecessary. However, the data processor’s suggestions regarding the CCTV installation were taken into account. Step 3: Risk Likelihood (Unlikely, Possible, Likely) Severity (Moderate, Severe, Critical) Overall risk (Low, Medium, High) There is a risk that the principle of lawfulness, fairness, and transparency will be compromised since individuals might not be aware of the CCTV location and its field of view. Likely Moderate Low There is a risk that the principle of integrity and confidentiality may be compromised in case the CCTV system is not monitored and controlled with adequate security measures. Possible Severe Medium There is a risk related to the right of individuals to be informed regarding the installation of CCTV cameras. Possible Moderate Low Step 4: Bus Spot will provide appropriate training to individuals that have access to the information generated by the CCTV system. In addition, it will ensure that the employees of the data processor are trained as well. In each entrance of the bus, a sign for the use of CCTV will be displayed. The sign will be visible and readable by all passengers. It will show other details such as the purpose of its use, the identity of Bus Spot, and its contact number in case there are any queries. Only two employees of Bus Spot will be authorized to access the CCTV system. They will continuously monitor it and report any unusual behavior of bus drivers or passengers to Bus Spot. The requests of individuals that are subject to a criminal activity for accessing the CCTV images will be evaluated only for a limited period of time. If the access is allowed, the CCTV images will be exported by the CCTV system to an appropriate file format. Bus Spot will use a file encryption software to encrypt data before transferring onto another file format. Step 5: Bus Spot's top management has evaluated the DPIA results for the processing of data through CCTV system. The actions suggested to address the identified risks have been approved and will be implemented based on best practices. This DPIA involves the analysis of the risks and impacts in only a group of buses located in the capital of Spain. Therefore, the DPIA will be reconducted for each of Bus Spot's buses in Spain before installing the CCTV system. Based on this scenario, answer the following question:

Question:

You are appointed as theDPO of Bus Spot.

What action would yousuggestwhen reviewing the results of theDPIApresented in scenario 6?

A.

Reconducting a DPIA for each busof Bus Spot isnot necessary, since the nature, scope, context, and purpose of data processing are similar in all buses.

B.

Displaying the identity of Bus Spot, its contact number, and the purpose of data processingin each bus isnot necessary; furthermore, it breaches thedata protection principles defined by GDPR.

C.

Using a data processor for CCTV images is not in compliance with GDPR, since the data generated from the CCTV system should be controlled and processed by Bus Spot.

D.

The DPIA should be reviewed annually, as CCTV surveillance presents ongoing risks to data subjects' privacy.

Question # 10

Scenario:2

Soyled is a retail company that sells a wide range of electronic products from top European brands. It primarily sells its products in its online platforms (which include customer reviews and ratings), despite using physical stores since 2015. Soyled's website and mobile app are used by millions of customers. Soyled has employed various solutions to create a customer-focused ecosystem and facilitate growth. Soyled uses customer relationship management (CRM) software to analyze user data and administer the interaction with customers. The software allows the company to store customer information, identify sales opportunities, and manage marketing campaigns. It automatically obtains information about each user's IP address and web browser cookies. Soyled also uses the software to collect behavioral data, such as users’ repeated actions and mouse movement information. Customers must create an account to buy from Soyled’s online platforms. To do so, they fill out a standard sign-up form of three mandatory boxes (name, surname, email address) and a non-mandatory one (phone number). When the user clicks the email address box, a pop-up message appears as follows: “Soyled needs your email address to grant you access to your account and contact you about any changes related to your account and our website. For further information, please read our privacy policy.' When the user clicks the phone number box, the following message appears: “Soyled may use your phone number to provide text updates on the order status. The phone number may also be used by the shipping courier." Once the personal data is provided, customers create a username and password, which are used to access Soyled's website or app. When customers want to make a purchase, they are also required to provide their bank account details. When the user finally creates the account, the following message appears: “Soyled collects only the personal data it needs for the following purposes: processing orders, managing accounts, and personalizing customers' experience. The collected data is shared with our network and used for marketing purposes." Soyled uses personal data to promote sales and its brand. If a user decides to close the account, the personal data is still used for marketing purposes only. Last month, the company received an email from John, a customer, claiming that his personal data was being used for purposes other than those specified by the company. According to the email, Soyled was using the data for direct marketing purposes. John requested details on how his personal data was collected, stored, and processed. Based on this scenario, answer the following question:

Question:

Based on scenario2, is John's request eligible under GDPR?

A.

No, data subjects can request access to how their data is being collected but not details about its processing or storage.

B.

No, data subjects are not eligible to request details on the collection, storage, or processing of their personal data.

C.

Yes, data subjects have theright to request detailson how their personal data is collected, stored, and processed.

D.

No, because John's data was collected based on legitimate interest.

Page: 1 / 3
Total 24 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025