List of questions
Related questions
Question 102 - CIPT discussion
In order to prevent others from identifying an individual within a data set, privacy engineers use a cryptographically-secure hashing algorithm. Use of hashes in this way illustrates the privacy tactic known as what?
A.
Isolation.
B.
Obfuscation.
C.
Perturbation.
D.
Stripping.
Your answer:
0 comments
Sorted by
Leave a comment first