Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CIPT All Questions

View all questions & answers for the CIPT exam

Exam CIPT topic 1 question 102 discussion

Actual exam question from IAPP's CIPT
Question #: 102
Topic #: 1
[All CIPT Questions]

In order to prevent others from identifying an individual within a data set, privacy engineers use a cryptographically-secure hashing algorithm. Use of hashes in this way illustrates the privacy tactic known as what?

  • A. Isolation.
  • B. Obfuscation.
  • C. Perturbation.
  • D. Stripping.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Ssourav
3 months, 2 weeks ago
Selected Answer: B
B. Obfuscation. Using a cryptographically-secure hashing algorithm to prevent others from identifying an individual in a dataset is a form of obfuscation, which involves disguising or masking data to protect privacy.
upvoted 1 times
...
837vq3
3 years ago
Obfuscation obstructs the ability to read or understand personal information. This is most commonly done with encryption or hashing but could also be done simply by using a code or little-known language.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...