exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 170 discussion

Actual exam question from Cisco's 350-901
Question #: 170
Topic #: 1
[All 350-901 Questions]

Which two strategies are used to protect personally identifiable information? (Choose two.)

  • A. Encrypt data in transit.
  • B. Encrypt hash values of data.
  • C. Encrypt data at rest.
  • D. Only hash usernames and passwords for efficient lookup.
  • E. Only encrypt usernames and passwords for efficient lookup.
Show Suggested Answer Hide Answer
Suggested Answer: AC 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
FR99
Highly Voted 2 years, 9 months ago
I go for ‘A & C’
upvoted 20 times
...
Teringzooi
Most Recent 7 months, 3 weeks ago
Selected Answer: AC
I go for A & C B seems incorrect as hashing makes the data inaccessible. If you hash a user's address, you cannot retrieve their address anymore.
upvoted 2 times
...
designated
9 months ago
Selected Answer: AC
A and C are correct. Basically, encrypt data everywhere.
upvoted 2 times
...
QuiShong
11 months, 1 week ago
Selected Answer: AC
A and C, B seems incorrect as hashing makes the data inaccessible. If you hash a user's address, you cannot retrieve their address anymore.
upvoted 2 times
...
ferock
1 year ago
Selected Answer: AC
GDPR demands that stored data undergo either an anonymization or a pseudonymization (deidentification) process. In both cases, PII data is removed; however, anonymization irreversibly destroys any way of identifying the data subject, whereas pseudonymization substitutes the identity of the data subject in such a way that with some additional information it is possible to re-identify the data subject. In other words, with pseudonymization, some unique ID is still present, but it’s not personally identifiable. Pseudonymization is less secure, as it allows re-identification either as a result of some authority’s request or due to advanced analytics (for example, from knowing that same person went to certain places, it is possible to deduce who he/she is). Encryption, integrity, and nonrepudiation technologies are used to protect data confidentiality and reliability. Data protection can be divided into data-at-rest and data-in-transit protection. Source: Cisco DEVCOR 350-901 Study Guide
upvoted 4 times
...
udo2020
1 year, 4 months ago
A and C seems to be correct!
upvoted 1 times
...
blezzzo
2 years, 8 months ago
A and C. Encryption of data in transit and Data at rest is the way to go for all the choices provided.
upvoted 1 times
...
Markn
2 years, 10 months ago
I think A C could be correct
upvoted 1 times
...
fechao
2 years, 10 months ago
A and C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago