ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 924 - CISSP discussion

Report
Export

Which of the following is used to ensure that data mining activities Will NOT reveal sensitive data?

A.
Implement two-factor authentication on the underlying infrastructure.
Answers
A.
Implement two-factor authentication on the underlying infrastructure.
B.
Encrypt data at the field level and tightly control encryption keys.
Answers
B.
Encrypt data at the field level and tightly control encryption keys.
C.
Preprocess the databases to see if inn ...... can be disclosed from the learned patterns.
Answers
C.
Preprocess the databases to see if inn ...... can be disclosed from the learned patterns.
D.
Implement the principle of least privilege on data elements so a reduced number of users can access the database.
Answers
D.
Implement the principle of least privilege on data elements so a reduced number of users can access the database.
Suggested answer: D
asked 18/09/2024
Carlos Cabezas
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first