exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 181 discussion

Actual exam question from Cisco's 350-901
Question #: 181
Topic #: 1
[All 350-901 Questions]

Which scenario is an example of the pseudonymization of sensitive data that meets GDPR requirements?

  • A. implementing X-Forwarded-For at the frontend of a web app to enable the source IP addresses of headers to change
  • B. separating the sensitive data into its own dedicated, secured data store and using tokens in its place.
  • C. encrypting sensitive data at rest by using native cloud services and data in transit by using SSL/TLS transport.
  • D. leveraging an application load balancer at the frontend of a web app for SSL/TLS decryption to inspect data in transit.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ferock
Highly Voted 1 year, 6 months ago
Selected Answer: B
Both pseudonymization and anonymization are methods of de-identifying PII, but the two techniques are distinct: Pseudonymization replaces the original PII with unique placeholders, pseudonyms, or reference tokens. Anonymization hides sensitive information through data masking (e.g., replacing it with blanks or Xs, scrambling the characters, substituting randomly generated information, etc.) https://www.integrate.io/blog/secure-pii-pseudonymization-how-to-do-it-right/#:~:text=Pseudonymization%20is%20a%20technique%20for,%2C%20a%20placeholder%20or%20pseudonym.)
upvoted 8 times
...
duracell
Highly Voted 1 year, 10 months ago
C is correct. If you were responsible for encrypting the data and are the holder of the key, you have the ability to re-identify individuals through decryption of that dataset. In this respect, encryption can be regarded as a pseudonymisation technique. It is a security measure designed to protect personal data.
upvoted 6 times
...
whipmuffin
Most Recent 5 months, 1 week ago
Selected Answer: B
https://sl.bing.net/fMtpHTa8k4i
upvoted 1 times
...
[Removed]
9 months ago
I asked ChatGPT and it answered B.
upvoted 1 times
...
[Removed]
1 year ago
Selected Answer: C
B and C both seem correct. I would choose C.
upvoted 1 times
...
Teringzooi
1 year ago
Selected Answer: C
C is correct
upvoted 1 times
...
Teringzooi
1 year, 1 month ago
Selected Answer: B
Correct answer: B A pseudonym can be a number, letter, special character, or any combination of those tied to a specific personal data or individual and, therefore, makes data safer to use in a business environment. https://dataprivacymanager.net/pseudonymization-according-to-the-gdpr/
upvoted 2 times
...
k_analisation
1 year, 6 months ago
I go with B - see here: https://dataprivacymanager.net/pseudonymization-according-to-the-gdpr/ [...]Pseudonymization can be achieved using various methods like data masking, encryption, or tokenization.[...]
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago