New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 7 Question 104 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 104
Topic #: 7
[All SSCP Questions]

Which of the following is used in database information security to hide information?

Show Suggested Answer Hide Answer
Suggested Answer: B

Polyinstantiation enables a relation to contain multiple tuples with the same primary keys with each instance distinguished by a security level. When this information is inserted into a database, lower-level subjects need to be restricted from this information. Instead of just restricting access, another set of data is created to fool the lower-level subjects into thinking that the information actually means something else.

Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 11: Application and System Development (page 727).


Contribute your Thoughts:

0/2000 characters
Alonzo
2 months ago
Not sure about this, sounds too technical!
upvoted 0 times
...
Aleisha
2 months ago
Wait, is inheritance really not the answer?
upvoted 0 times
...
Wilford
3 months ago
Definitely B, it’s all about hiding data layers.
upvoted 0 times
...
Earleen
3 months ago
I thought it was polymorphism.
upvoted 0 times
...
Bea
3 months ago
Polyinstantiation is the right answer!
upvoted 0 times
...
Latrice
3 months ago
I definitely remember polyinstantiation being mentioned in the context of security, especially for sensitive data.
upvoted 0 times
...
Queenie
4 months ago
Inheritance sounds familiar, but I can't recall if it's about hiding data or something else entirely.
upvoted 0 times
...
Anabel
4 months ago
I remember practicing a question about polymorphism, but I don't think it relates to security.
upvoted 0 times
...
Percy
4 months ago
I think polyinstantiation is the one that deals with hiding information in databases, but I'm not completely sure.
upvoted 0 times
...
Dorsey
4 months ago
Okay, I've got this. Polyinstantiation is the technique used to create multiple versions of the same data object with different security classifications. That's the one that hides information in a database.
upvoted 0 times
...
Myra
4 months ago
I'm a bit confused on the difference between polymorphism and polyinstantiation. I'll need to review those concepts before answering this.
upvoted 0 times
...
Gregg
5 months ago
Polyinstantiation - that's the one that allows multiple instances of the same object with different security levels, right? I think that might be the answer here.
upvoted 0 times
...
Rodrigo
5 months ago
Hmm, this looks like a tricky one. I'll need to think carefully about the different database security concepts and which one is specifically used to hide information.
upvoted 0 times
...
Leandro
7 months ago
Wait, is this a trick question? Maybe they're testing if we know the difference between database design patterns and actual security measures. *chuckles*
upvoted 0 times
...
Sunshine
7 months ago
I believe it's B) Polyinstantiation because it allows multiple instances of the same data to exist.
upvoted 0 times
...
Whitney
7 months ago
I'm not sure, but I think C) Polymorphism could also be a possible answer.
upvoted 0 times
...
Cassie
7 months ago
Ah, I see what they're going for. B) Polyinstantiation is the way to go. Gotta love those database security tricks!
upvoted 0 times
Anisha
5 months ago
Database security is so important in today's digital world.
upvoted 0 times
...
Ashleigh
6 months ago
I always find it fascinating how technology evolves to keep our information safe.
upvoted 0 times
...
Lashawn
6 months ago
It's amazing how these techniques can hide information in databases.
upvoted 0 times
...
Keith
6 months ago
I agree, B) Polyinstantiation is definitely a key player in database security.
upvoted 0 times
...
...
Jess
7 months ago
I agree with Latonia, Polyinstantiation is used to hide information in database security.
upvoted 0 times
...
Tamar
7 months ago
D) Delegation? Really? That's more for sharing responsibilities, not hiding data. Come on, people!
upvoted 0 times
Jerilyn
7 months ago
B) Polyinstantiation is another technique used to hide information in database security.
upvoted 0 times
...
Aleisha
7 months ago
A) Inheritance is used to hide information in database security.
upvoted 0 times
...
...
Brock
8 months ago
Hmm, I'm not too sure about that. Polyinstantiation sounds more like a fancy database term than a security feature.
upvoted 0 times
...
Lea
8 months ago
I think B) Polyinstantiation is the correct answer to hide information in database security.
upvoted 0 times
Karma
7 months ago
I believe D) Delegation is also a valid option for hiding information in database security.
upvoted 0 times
...
Mitsue
7 months ago
I think it might be C) Polymorphism instead.
upvoted 0 times
...
Frederick
7 months ago
I agree, B) Polyinstantiation is used to hide information in database security.
upvoted 0 times
...
...
Latonia
8 months ago
I think the answer is B) Polyinstantiation.
upvoted 0 times
...

Save Cancel