CIPP-E EXAM PRACTICE EXAM AND STUDY GUIDE
NEWEST 2025/ 2026 ACTUAL EXAM 300 QUESTIONS
AND CORRECT DETAILED ANSWERS WITH
RATIONALES (VERIFIED ANSWERS) |A+ GRADED||
NEWEST UPDATE!!!
How does engaging sub-processors work? - ANSWER--
Use of sub-processors requires prior written authorization
of the controller
- Same data protection obligations must be imposed on
sub-processors, but initial processor remains liable for the
sub-processor's failures
In the event of a breach, on what timeline is notification to
the supervisory authority required? - ANSWER-- Without
undue delay, and, where feasible, within 72 hours, if the
breach is likely to result in a RISK for the rights and
freedoms of natural persons, UNLESS unlikely to cause
harm
- Delay permitted if "reasonable justification"
In the event of a breach, on what timeline is notification to
data subjects required? - ANSWER-- Without undue delay
,2|Page
- If it is likely to result in a HIGH RISK to the rights and
freedoms of the individual
- UNLESS:
----- Data was previously rendered unintelligible or
encrypted,
----- Risk to data subjects negated by measures taken
----- Disproportionate effort is required to provide public
notice
In the event of a breach, on what timeline is notification to
controllers required? - ANSWER-- Without undue delay
- Clock starts from becoming aware of the breach
(NOTE: this is the sole notification duty for processors)
,3|Page
What are the four fundamental requirements of
accountability? - ANSWER-- Implement data protection by
design and data protection by default
- Conduct a data protection impact assessment
- Maintain data processing records
- Possibly appoint a data protection officer (DPO)
What are the two main values of the data protection
impact assessment? - ANSWER-- Incorporating data
protection considerations into organizational planning
- Demonstrating compliance to supervisory authorities
When is a data protection impact assessment required? -
ANSWER-If the processing is "likely to entail a high risk to
the rights and freedoms of natural persons" (Article 35(1))
What should the DPIA include? - ANSWER-- Description
of processing (purpose, legitimate interest)
, 4|Page
- Necessity of the processing
- Proportionality of processing
- Risks that processing poses to data subjects
- Measures to address those risks (i.e., data protection by
design and data protection by default controls)
When is a DPO required? - ANSWER-- The controller is a
public authority
- Core activities include regular and systematic monitoring
on a large scale
- Core activities consist of large-scale processing a special
categories
What are a DPO's tasks and responsibilities? - ANSWER--
Report to the highest management (but the management
may not instruct/curtail their actions)