Data Privacy Assessment Questions 2nd Part

This is a set of 11 Data Privacy Assessment Questions and Answers 2nd Part. Please NOTE that all questions and answers are based on our research and self-study. 

1.) Where or how should you request to know more about your Pl? Please look at the question and state where should you look into this.
A.) Personal Data Breach Handling Procedures Manual.
B.) Data Subject Rights Enabling and Handling Guidelines
C.) Company Privacy Policy
D.) None of the options given above

Answer:- B

2.) Where or how can you report a privacy incident? Please look at the question and state where can this information be located.
A.) Personal Data Breach Handling Procedures Manual
B.) Privacy Requirements and Procedures Manual
C.) Company Privacy Policy
D.) Data Subject Rights Enabling and Handling Guidelines

Answer:- A

3.) Which privacy principles and rights are applicable to you? Please look at the question and state where can you locate this document.
A.) Personal Data Breach Handling Procedures Manual
B.) Privacy Requirements and Procedures Manual
C.) Company Privacy Policy
D.) Data Subject Rights Enabling and Handling Guidelines

Answer:- C

4.) From the below options, what would you do if you want to understand the privacy requirements in a specific sector/country/geography in Data privacy?
A.) Raise a Privacy Incident
B.) Connect with the senior management
C.) Reach out to local (country/geo/function/unit) data privacy office

Answer:- C

5.) Which of the following is part of any privacy regulation in the world?
A.) Enforcement mechanisms
B.) Definition of PI and SPI
C.) Data Privacy principles and requirements
D.) All the options are correct

Answer:- D

6.)Which of the following is correct?
A.) Everyone in Company is responsible for ensuring that personal information is processed appropriately
B.) It is the accountability of the DPO to ensure that the personal information is processed appropriately
C.) Limit the amount and type of information gathered to what is necessary for your identified purpose
D.) None of the above

Answer:- A

7.) Data privacy is a/an_________________________.
A.) Political right
B.) Employee desire
C.) Fundamental/Personal right
D.) None of the above

Answer:- C

8.) Which among the following is correct in relation to PI, SPI, PFI, and PHI?
A.) PHI is always a subset of SPI
B.) PFI is always a subset of PHI
C.) PHI and PFI are always a subset of Pl and SPI
D.) SPI, PFI, and PHI are always a subset of PI

Answer:- D

9.) You were working on something on your system when you received an email to fill out an Excel
sheet to nominate for a sports event. You noticed in Excel that many of your team members
and your managers have been nominated. What will you do?
A.) You will fill Excel with all details and send
B.) You will delete others’ data and fill in your details and send
C.) You will neither fill in nor share the details with your manager
D.) You will delete the mail from your inbox and raise an incident in IMT

Answer:- D

10.) What is more important – data security or data privacy or data utility?
A.) Data security
B.) Data Privacy
C.) Data utility
D.) All of them

Answer:- D

11.) Which of the following is true:
A.) A privacy incident need not always involve/cause a security breach
B.) A security incident need not always involve/cause a privacy breach
C.) Some incidents can be both privacy incidents as well as a security incident
D.) All of the above

Answer:- D

MUST READ:

Data Privacy Assessment Questions & Answers
ORACLE APEX Overview 2023

data privacy assessment data privacy assessment data privacy assessment data privacy assessment data privacy assessment data privacy assessment

Leave a Reply

Your email address will not be published. Required fields are marked *