exam questions

Exam Professional Cloud Security Engineer All Questions

View all questions & answers for the Professional Cloud Security Engineer exam

Exam Professional Cloud Security Engineer topic 1 question 17 discussion

Actual exam question from Google's Professional Cloud Security Engineer
Question #: 17
Topic #: 1
[All Professional Cloud Security Engineer Questions]

An employer wants to track how bonus compensations have changed over time to identify employee outliers and correct earning disparities. This task must be performed without exposing the sensitive compensation data for any individual and must be reversible to identify the outlier.
Which Cloud Data Loss Prevention API technique should you use to accomplish this?

  • A. Generalization
  • B. Redaction
  • C. CryptoHashConfig
  • D. CryptoReplaceFfxFpeConfig
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
xhova
Highly Voted 4 years, 6 months ago
Answer is D https://cloud.google.com/dlp/docs/pseudonymization
upvoted 17 times
smart123
4 years, 4 months ago
Option D is correct because it is reversible whereas option B is not.
upvoted 3 times
...
SilentSec
4 years, 3 months ago
Also the same usecase in the url that you post. D is right.
upvoted 1 times
...
...
gcp_learner
Highly Voted 4 years, 3 months ago
The answer is A. By bucketing or generalizing, we achieve a reversible pseudonymised data that can still yield the required analysis. https://cloud.google.com/dlp/docs/concepts-bucketing
upvoted 6 times
Sheeda
4 years, 2 months ago
Completely wrong The answer is D for sure. The example was even in google docs but replaced for some reasons. http://price2meet.com/gcp/docs/dlp_docs_pseudonymization.pdf
upvoted 7 times
...
...
crazycosmos
Most Recent 4 months, 3 weeks ago
Selected Answer: D
it is reversible for D
upvoted 1 times
...
ManuelY
5 months, 2 weeks ago
Selected Answer: D
Reversible
upvoted 1 times
...
Kiroo
6 months, 2 weeks ago
Selected Answer: D
For sure is D https://cloud.google.com/sensitive-data-protection/docs/transformations-reference#fpe I was in doubt about C but the hash can’t be returned into the original value
upvoted 1 times
...
ketoza
9 months, 3 weeks ago
Selected Answer: D
https://cloud.google.com/dlp/docs/transformations-reference#fpe
upvoted 1 times
...
okhascorpio
1 year ago
A. seems like good fit here. Preserve data utility while also reducing the identifiability of the data. https://cloud.google.com/dlp/docs/concepts-bucketing
upvoted 1 times
okhascorpio
1 year ago
I take it back. its not reversible.
upvoted 1 times
...
...
[Removed]
1 year, 3 months ago
Selected Answer: D
The keyword here is "reversible" or allows for "re-identification". Out of the options listed, Format preserving encryption (FPE-FFX) is the only one that allows "re-identification". Therefore "D" is the most accurate option. References: https://cloud.google.com/dlp/docs/pseudonymization (see the table) https://en.wikipedia.org/wiki/Format-preserving_encryption
upvoted 2 times
...
aashissh
1 year, 6 months ago
Selected Answer: A
Generalization is a technique that replaces an original value with a similar, but not identical, value. This technique can be used to help protect sensitive data while still allowing statistical analysis. In this scenario, the employer can use generalization to replace the actual bonus compensation values with generalized values that are statistically similar but not identical. This allows the employer to perform analysis on the data without exposing the sensitive compensation data for any individual employee. Using Generalization can be reversible to identify outliers. The employer can then use the original data to investigate further and correct any earning disparities. Redaction is another DLP API technique that can be used to protect sensitive data, but it is not suitable for this scenario since it would remove the data completely and make statistical analysis impossible. CryptoHashConfig and CryptoReplaceFfxFpeConfig are also not suitable for this scenario since they are encryption techniques and do not allow statistical analysis of data.
upvoted 3 times
...
aashissh
1 year, 6 months ago
Answer is A: Generalization is a technique that replaces an original value with a similar, but not identical, value. This technique can be used to help protect sensitive data while still allowing statistical analysis. In this scenario, the employer can use generalization to replace the actual bonus compensation values with generalized values that are statistically similar but not identical. This allows the employer to perform analysis on the data without exposing the sensitive compensation data for any individual employee. Using Generalization can be reversible to identify outliers. The employer can then use the original data to investigate further and correct any earning disparities. Redaction is another DLP API technique that can be used to protect sensitive data, but it is not suitable for this scenario since it would remove the data completely and make statistical analysis impossible. CryptoHashConfig and CryptoReplaceFfxFpeConfig are also not suitable for this scenario since they are encryption techniques and do not allow statistical analysis of data.
upvoted 1 times
...
Lyfedge
1 year, 7 months ago
Correct Answer is (D): De-identifying sensitive data Cloud Data Loss Prevention (DLP) can de-identify sensitive data in text content, including text stored in container structures such as tables. De-identification is the process of removing identifying information from data. The API detects sensitive data such as personally identifiable information (PII), and then uses a de-identification transformation to mask, delete, or otherwise obscure the data. For example, de-identification techniques can include any of the following: Masking sensitive data by partially or fully replacing characters with a symbol, such as an asterisk (*) or hash (#).
upvoted 1 times
...
mahi9
1 year, 8 months ago
Selected Answer: D
D is the most viable option
upvoted 1 times
...
null32sys
1 year, 8 months ago
The Answer is A
upvoted 1 times
...
Ishu_awsguy
1 year, 9 months ago
Correct answer is D. But, The answer does not have a CryptoDeterministicConfig . We recommend using CryptoDeterministicConfig for all use cases which do not require preserving the input alphabet space and size, plus warrant referential integrity. https://cloud.google.com/dlp/docs/transformations-reference#transformation_methods
upvoted 1 times
...
zanhsieh
1 year, 10 months ago
Answer D. Note that `CryptoReplaceFfxFpeConfig` might not be used in a real exam; they might change to `format preserve encryption`.
upvoted 5 times
...
Littleivy
1 year, 11 months ago
The answer is D https://cloud.google.com/dlp/docs/transformations-reference#transformation_methods
upvoted 2 times
...
Premumar
1 year, 12 months ago
Selected Answer: D
D is the only option that is reversible.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago