Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 175 discussion

Actual exam question from ISC's CISSP
Question #: 175
Topic #: 1
[All CISSP Questions]

While performing a security review for a new product, an information security professional discovers that the organization's product development team is proposing to collect government-issued identification (ID) numbers from customers to use as unique customer identifiers. Which of the following recommendations should be made to the product development team?

  • A. Customer identifiers should be a variant of the user's government-issued ID number.
  • B. Customer identifiers should be a cryptographic hash of the user's government-issued ID number.
  • C. Customer identifiers that do not resemble the user's government-issued ID number should be used.
  • D. Customer identifiers should be a variant of the user's name, for example, "jdoe" or "john.doe."
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
izaman2022
Highly Voted 2 years, 1 month ago
Selected Answer: C
C sounds like it is defining/leading towards tokenization. Take the government identifier and turn into a token. Ideally the token won't resemble the original sensitive gov id but could be used as a unique derived customer identifier
upvoted 7 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
Joe_Cheng
Highly Voted 2 years, 1 month ago
Selected Answer: C
I don't think it is needed to use government ID for Customer identifiers.
upvoted 5 times
...
TheManiac
Most Recent 6 months, 1 week ago
Selected Answer: C
I know you are between B and C. but the answer is C. WHY? Bcoz it is another department and you are the CISSP. You cannot tell them what to do. There might be easier ways for them to use govt ID numbers in different ways or use something else. Also, when you say "B", it means you agree C so that you take a step ahead to give them this idea on B. C comes first and leads to B. C is the answer.
upvoted 1 times
...
splash2357
10 months ago
I choose C. Even hash is meant to be irreversible, storing hash still store the actual ID in some form. Hash may be cracked to reveal the actual data. This is especially the case when weak hash are used. And of course cracking strong hashing algorithm like BCrypt is very hard, but theoretically it can still be performed. It may also be easier to create a rainbow table/perform a bruteforce attack, given the ID format/length is fixed and publicly known. C just said that a ID that doesn't resembles the actual government ID was used, which sounds better.
upvoted 1 times
...
YesPlease
11 months, 2 weeks ago
Selected Answer: C
Answer C) You may need to put the customer identifier on paperwork....and writing out a HASH won't be reasonable.
upvoted 2 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: C
Option D suggests using a variant of the user's name as the customer identifier, for example, "jdoe" or "john.doe." While this may seem like a reasonable alternative, it is not recommended because it is still possible for an attacker to use the customer identifier to guess the user's actual name or other personal information. Using customer identifiers that do not resemble the user's government-issued ID number is a better approach because it makes it more difficult for attackers to guess or obtain the user's personal information.
upvoted 1 times
...
georgegeorge125487
1 year, 3 months ago
Selected Answer: C
Do not use PII, unless you absolutly need it.
upvoted 1 times
...
Dee83
1 year, 10 months ago
C. Customer identifiers that do not resemble the user's government-issued ID number should be used. Using government-issued ID numbers as customer identifiers could put customers' personal information at risk, as these numbers can be used for identity theft. Additionally, it may violate regulations such as the General Data Protection Regulation (GDPR) and other privacy laws. To mitigate this risk, the information security professional should recommend that the product development team use a different type of customer identifier that does not resemble the user's government-issued ID number. This could include a randomly generated alphanumeric string or a combination of letters and numbers, it could also be a unique identifier that is generated by the system and is not related to the user's personal information.
upvoted 1 times
...
RVoigt
1 year, 10 months ago
CISSP Official Study Guide 6th edition - 'Hashing functions are algorithms which, when applied to plain text, produce a representation of that plain text. This message digest can be used to verify the integrity of the original plaintext (or a copy of it) by reapplying the hash function to it.' Hash the government ID and you obfuscate what the original number was.
upvoted 1 times
RVoigt
1 year, 10 months ago
hit submit instead of convert to vote - answer - IS - B!
upvoted 1 times
...
...
rajkamal0
1 year, 11 months ago
Selected Answer: C
Carefully reading option C - I am interpreting as "Use non government user ID instead" C is correct.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
Option C is the general definition of de-identification techniques. And I feel it is right, because you can use any technique you want for example; anonymization, masking, tokenization, hashing, encryption, etc.
upvoted 1 times
...
Nickname53796
2 years, 1 month ago
Selected Answer: D
I don’t care if I am right or not; it would be wrong to collect gov IDs for such a trivial thing.
upvoted 4 times
franbarpro
2 years, 1 month ago
Good luck on the CISSP with that....
upvoted 6 times
...
...
Rollizo
2 years, 1 month ago
Selected Answer: C
"development team is proposing to collect government-issued identification (ID) numbers from customers to use as unique customer identifiers", it this is the unique usage, it would be right to use another identifier
upvoted 3 times
...
Cww1
2 years, 2 months ago
B makes sense because it would hide the gov identifier, but i think im leaning C?
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...