Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Aggregation happens when a user does not have the clearance or permission to access specific information, but does have the permission to access components of the information. Inference Security Issues arise when a user deduces the full story from accessing components of the information. Inference is the intended result of aggregation. A technique to counter inference is cell _________. This technique hides specific cells that contain information that could be used in inference attacks
None of the above
Noise and Perturbation
Suppression
Partitioning
Partitioning -- Cells are not portioned. Databases are partitioned to make it harder for an unauthorized individual to find connecting pieces of data.
Cell Suppression -- is a technique to hide specific cells that contain information that could be used in an inference attack
Noise and Perturbation -- is a technique of inserting fake information in hopes of misdirecting an attacking or confusing an attacker
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.