Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CDPSE Topic 5 Question 59 Discussion

Actual exam question for Isaca's CDPSE exam
Question #: 59
Topic #: 5
[All CDPSE Questions]

Which of the following is the BEST way to hide sensitive personal data that is in use in a data lake?

Show Suggested Answer Hide Answer
Suggested Answer: B

The principle of least privilege is the most important principle to apply when granting access to an ERP system that contains a significant amount of personal dat

a. The principle of least privilege states that users should only have the minimum level of access and permissions necessary to perform their legitimate tasks and functions, and no more. Applying the principle of least privilege helps to protect the privacy and security of the personal data in the ERP system, as it reduces the risk of unauthorized or inappropriate access, disclosure, modification, or deletion of the data. It also helps to comply with the privacy laws and regulations, such as the GDPR, that require data controllers and processors to implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk.


Contribute your Thoughts:

Hana
28 days ago
Data truncation, huh? That's one way to make the data less meaningful, I guess. Not very practical though.
upvoted 0 times
...
Thad
29 days ago
Why not just delete the sensitive data altogether? That's the ultimate way to keep it safe. (Just kidding, I know that's not a realistic option.)
upvoted 0 times
Sharmaine
5 days ago
D) Data minimization is important to reduce the amount of sensitive data stored.
upvoted 0 times
...
Carma
6 days ago
C) Data encryption is another effective method to keep personal data secure.
upvoted 0 times
...
Audra
15 days ago
A) Data masking is a good way to protect sensitive data without deleting it.
upvoted 0 times
...
...
Tawanna
1 months ago
Data minimization sounds like a smart choice. If you don't need the full data set, why not just use the bare minimum?
upvoted 0 times
Jamey
2 days ago
Data masking can be effective in hiding personal data while still allowing for analysis.
upvoted 0 times
...
Tijuana
14 days ago
Data encryption is also important for protecting sensitive information.
upvoted 0 times
...
Dan
14 days ago
Data minimization is a good option. It helps reduce the risk of exposure.
upvoted 0 times
...
...
Harrison
1 months ago
I'd go with data masking. It's a great way to anonymize the data without losing its utility.
upvoted 0 times
Juan
4 days ago
D) Data minimization is important too. The less data you have, the less you have to worry about protecting.
upvoted 0 times
...
Viola
17 days ago
C) Data encryption is also a good option for hiding sensitive data. It adds an extra layer of security.
upvoted 0 times
...
Dorcas
25 days ago
A) Data masking is definitely the way to go. It keeps the data secure while still allowing it to be used.
upvoted 0 times
...
...
Dana
2 months ago
Data encryption is definitely the way to go. It's the most secure option for protecting sensitive personal data.
upvoted 0 times
Ruth
11 days ago
Definitely, it provides the highest level of security for protecting data.
upvoted 0 times
...
Vanda
14 days ago
I agree, data encryption is the best way to hide sensitive personal data.
upvoted 0 times
...
Sage
15 days ago
C) Data encryption
upvoted 0 times
...
Sonia
1 months ago
A) Data encryption
upvoted 0 times
...
...
Elin
2 months ago
I'm not sure, but I think data masking could also be a good option to hide sensitive data.
upvoted 0 times
...
Frederica
3 months ago
I agree with Lynelle, data encryption is the most secure option.
upvoted 0 times
...
Lynelle
3 months ago
I think the best way is data encryption.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77