New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CDPSE Exam - Topic 2 Question 68 Discussion

Actual exam question for Isaca's CDPSE exam
Question #: 68
Topic #: 2
[All CDPSE Questions]

Which of the following is an example of data anonymization as a means to protect personal data when sharing a database?

Show Suggested Answer Hide Answer
Suggested Answer: D

Data anonymization is a method of protecting personal data by modifying or removing any information that can be used to identify an individual, either directly or indirectly, in a data set. Data anonymization aims to prevent the re-identification of the data subjects, even by the data controller or processor, or by using additional data sources or techniques. Data anonymization also helps to comply with data protection laws and regulations, such as the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA), which require data controllers and processors to respect the privacy rights and preferences of the data subjects.

The data is transformed such that re-identification is impossible is an example of data anonymization, as it involves applying irreversible techniques, such as aggregation, generalization, perturbation, or synthesis, to alter the original data in a way that preserves their utility and meaning, but eliminates their identifiability. For example, a database of customer transactions can be anonymized by replacing the names and addresses of the customers with random codes, and by adding noise or rounding to the amounts and dates of the transactions.

The other options are not examples of data anonymization, but of other methods of protecting personal data that do not guarantee the impossibility of re-identification. The data is encrypted and a key is required to re-identify the data is an example of data pseudonymization, which is a method of replacing direct identifiers with pseudonyms, such as codes or tokens, that can be linked back to the original data with a key or algorithm. Data pseudonymization does not prevent re-identification by authorized parties who have access to the key or algorithm, or by unauthorized parties who can break or bypass the encryption. Key fields are hidden and unmasking is required to access to the data is an example of data masking, which is a method of concealing or obscuring sensitive data elements, such as names or credit card numbers, with characters, symbols or blanks. Data masking does not prevent re-identification by authorized parties who have permission to unmask the data, or by unauthorized parties who can infer or guess the hidden data from other sources or clues. Names and addresses are removed but the rest of the data is left untouched is an example of data deletion, which is a method of removing direct identifiers from a data set. Data deletion does not prevent re-identification by using indirect identifiers, such as age, gender, occupation or location, that can be combined or matched with other data sources to re-establish the identity of the data subjects.


Big Data Deidentification, Reidentification and Anonymization - ISACA, section 2: ''Anonymization is the ability for the data controller to anonymize the data in a way that it is impossible for anyone to establish the identity of the data.''

Data Anonymization - Overview, Techniques, Advantages, section 1: ''Data anonymization is a method of ensuring that the company understands and enforces its duty to secure sensitive, personal, and confidential data in a world of highly complex data protection mandates that can vary depending on where the business and the customers are based.''

Contribute your Thoughts:

0/2000 characters
Lashon
2 months ago
D is the gold standard for protecting personal data!
upvoted 0 times
...
Samuel
2 months ago
Wait, can re-identification really be made impossible?
upvoted 0 times
...
Merlyn
2 months ago
Option D is the best example of true anonymization.
upvoted 0 times
...
Brandon
3 months ago
I disagree, C seems like a valid option too.
upvoted 0 times
...
Belen
3 months ago
Definitely not A or B, those still allow for identification.
upvoted 0 times
...
Celia
3 months ago
I’m confused about A and B too, since they both involve keys and unmasking, which seems more like encryption than anonymization.
upvoted 0 times
...
Robt
3 months ago
I practiced a question like this, and I feel like D is definitely the best answer since it mentions that re-identification is impossible.
upvoted 0 times
...
Cristal
4 months ago
I'm not entirely sure, but I remember something about removing identifiable information. C sounds familiar, but it might not be complete anonymization.
upvoted 0 times
...
Celestina
4 months ago
I think data anonymization means making it impossible to trace back to individuals, so maybe D is the right choice?
upvoted 0 times
...
Azalee
4 months ago
I feel pretty good about this question. Data anonymization is all about removing or obscuring personal identifiers, so I think option C of just removing names and addresses is a good example. But I'll double-check the other options just to be sure.
upvoted 0 times
...
Germaine
4 months ago
Wait, I'm a little confused. Is option B also a valid form of data anonymization? Hiding key fields and requiring unmasking seems like it could work too. I'll have to think about this some more.
upvoted 0 times
...
Delsie
4 months ago
Okay, I've got this. Option D is the correct answer - transforming the data so that re-identification is impossible is a key technique for data anonymization. I'm confident in that.
upvoted 0 times
...
Tijuana
4 months ago
Hmm, I'm a bit unsure about this one. I know data anonymization is important for protecting privacy, but I'm not totally clear on the specific methods. Let me think this through carefully.
upvoted 0 times
...
Lucia
5 months ago
This seems like a straightforward question about data anonymization techniques. I think I know the answer, but I'll double-check the options to be sure.
upvoted 0 times
...
Zona
5 months ago
D all the way, baby! Can't have those hackers and snoops getting their hands on our sensitive info. Time to make it disappear completely!
upvoted 0 times
...
Ryan
5 months ago
Hmm, I'm between B and D. But I think D is the best option to ensure no chance of re-identification. Gotta keep that data locked down tight!
upvoted 0 times
Alexia
5 months ago
It's all about keeping data secure. D is the way to go!
upvoted 0 times
...
Phil
5 months ago
I agree with you, D seems way safer!
upvoted 0 times
...
Earleen
5 months ago
B has its merits, but D stops all chances of re-identification.
upvoted 0 times
...
Alexis
5 months ago
Exactly! No way to trace it back is the best choice.
upvoted 0 times
...
...
Gladys
6 months ago
Wow, this is a tough one. I'm going to have to go with D. Can't be too careful with people's personal data these days, you know?
upvoted 0 times
...
Weldon
6 months ago
I agree with Jina, D is the correct answer because re-identification should be impossible.
upvoted 0 times
...
Sherman
7 months ago
C is just hiding the obvious identifiers, not really anonymizing the data. D is the way to go.
upvoted 0 times
Margot
5 months ago
C) Names and addresses are removed but the rest of the data is left untouched.
upvoted 0 times
...
Luisa
5 months ago
A) The data is encrypted and a key is required to re-identify the data.
upvoted 0 times
...
...
Carry
7 months ago
I think the answer is C because only names and addresses are removed.
upvoted 0 times
...
Jina
7 months ago
I disagree, I believe the answer is D.
upvoted 0 times
...
Portia
7 months ago
D seems like the only way to truly anonymize the data. Anything else still leaves a chance of re-identification.
upvoted 0 times
Jess
5 months ago
D) The data is transformed such that re-identification is impossible.
upvoted 0 times
...
Jarvis
5 months ago
A) The data is encrypted and a key is required to re-identify the data.
upvoted 0 times
...
...
Daryl
7 months ago
I think the answer is A.
upvoted 0 times
...

Save Cancel