nerdexam
(ISC)2(ISC)2

CISSP · Question #671

CISSP Question #671: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP to reveal the answer and full explanation for question #671. The question stem and answer options stay visible for context.

Submitted by rania.sa· Mar 5, 2026Security Architecture and Engineering

Question

Which of the following is used to ensure that data mining activities will NOT reveal sensitive data?

Options

  • AImplement two-factor authentication on the underlying infrastructure.
  • BEncrypt data at the field level and tightly control encryption keys.
  • CPreprocess the databases to see if information can be disclosed from the learned patterns.
  • DImplement the principle of least privilege on data elements so a reduced number of users can

Unlock CISSP to see the answer

You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#data privacy#data masking#encryption#data mining security
Full CISSP PracticeBrowse All CISSP Questions