nerdexam
DatabricksDatabricks

CERTIFIED-DATA-ANALYST-ASSOCIATE · Question #92

CERTIFIED-DATA-ANALYST-ASSOCIATE Question #92: Real Exam Question with Answer & Explanation

The correct answer is C: Stop working with the data and notify their supervisor to ensure the data is handled following. Option C is correct because when a data analyst accidentally encounters PII they're not authorized to access, the proper protocol is to stop immediately and escalate - the supervisor or data governance team must be notified so the data can be secured, access controls reviewed, an

Question

A data analyst has come across a column in a table that contains personally identifiable information (PII). The data analyst should not have access to this type of PII data. How should the data analyst proceed?

Options

  • AStop working with the data and delete the table and any existing metadata or data files.
  • BStop working with the data and proceed with the project using other data.
  • CStop working with the data and notify their supervisor to ensure the data is handled following
  • DDrop the column containing PII data and continue with the project without notifying anybody.

Explanation

Option C is correct because when a data analyst accidentally encounters PII they're not authorized to access, the proper protocol is to stop immediately and escalate - the supervisor or data governance team must be notified so the data can be secured, access controls reviewed, and any compliance requirements (like GDPR or HIPAA) properly followed.

  • A is wrong because deleting the table or data files is a destructive, unauthorized action - the analyst doesn't own the data and could destroy legitimate records or violate retention policies.
  • B is wrong because simply moving on without reporting leaves the underlying access control problem unresolved; others may also be improperly accessing the same data.
  • D is wrong for two reasons: dropping a column is again an unauthorized destructive action, and failing to notify anyone means the security breach goes unreported and unaddressed.

Memory tip: Think of the "PII protocol" as Stop, Don't Touch, Tell Someone - any action that modifies or deletes data (A, D) or ignores the problem (B) fails at least one of those three steps, making C the only safe choice.

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-DATA-ANALYST-ASSOCIATE PracticeBrowse All CERTIFIED-DATA-ANALYST-ASSOCIATE Questions