Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Alibaba Exam ACA-Database Topic 2 Question 64 Discussion

Actual exam question for Alibaba's ACA-Database exam
Question #: 64
Topic #: 2
[All ACA-Database Questions]

Which of the following is NOT true, regarding the sensitive data management feature provided by Data Management (DMS)?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Ramonita
19 days ago
So, they let you see the de-identified data, but not the real sensitive stuff? Sounds like a great way to get in trouble!
upvoted 0 times
...
Harrison
21 days ago
Wait, I can actually view the de-identified data? This must be a joke, right? Where's the security?
upvoted 0 times
...
Kristofer
23 days ago
Field-level and row-level permissions? That's a nice touch. Sounds like a comprehensive solution.
upvoted 0 times
...
Larae
29 days ago
The de-identification features seem pretty robust, but I wonder how reliable they are in practice.
upvoted 0 times
Lorean
1 days ago
User1: I think the de-identification algorithms are pretty reliable.
upvoted 0 times
...
...
Ria
1 months ago
Option A sounds a bit too good to be true. I'm not sure if the rules can really be recognized automatically.
upvoted 0 times
Claudia
7 days ago
User 3: Yeah, I'm not sure if the rules can really be recognized automatically.
upvoted 0 times
...
Valentine
8 days ago
User 2: I think so too. It seems like it might be a bit of an exaggeration.
upvoted 0 times
...
Dorothy
13 days ago
User 1: I agree, option A does sound a bit too good to be true.
upvoted 0 times
...
...
Bo
2 months ago
I'm not sure, but I think D) After you configure de-identification algorithms, you can view the de-identified data, might also be correct.
upvoted 0 times
...
Lonna
2 months ago
I agree with Rosendo, because the other options seem to be true based on the features of DMS.
upvoted 0 times
...
Rosendo
2 months ago
I think the answer is C) Field-level and row-level permissions are supported.
upvoted 0 times
...
Laquanda
2 months ago
I'm not sure about that. I think the answer might be D) After you configure de-identification algorithms, you can view the de-identified data.
upvoted 0 times
...
Carin
2 months ago
I agree with Josefa. It makes sense that sensitive data management would include permissions at both the field and row level.
upvoted 0 times
...
Josefa
2 months ago
I think the answer is C) Field-level and row-level permissions are supported.
upvoted 0 times
...

Save Cancel