logo

Crowdly

BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609]

Looking for BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] test answers and solutions? Browse our comprehensive collection of verified answers for BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] at moovit.vit.ac.in.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

A bank wants to protect customer transaction data before sharing it with analysts. Instead of modifying values, they generalize transaction amounts into broad categories (e.g., "low," "medium," "high"). What type of anonymization technique is used?

View this question

A power company provides energy consumption data of customers for a research study. Even though names are removed, researchers detect daily patterns showing when people are at home, sleeping, or on vacation.

Which disclosure risk does this case represent?

View this question

The technique used to prevent identity disclosure by principle of indistinguishability on k-records is referred to as

View this question

What is the primary purpose of tokenization in data privacy?

View this question

A bank records transactions and classifies customer information as follows:

  • Name & Account Number: Explicit Identifier
  • Transaction History: Sensitive Data
  • Age Range & ZIP Code: Quasi-Identifiers
  • Branch Location: Non-Sensitive Data

Which of the following is not correctly classified?

View this question

If all medical records in a dataset for a rare disease contain “Female, Age 45, Lives in City X,” which privacy attack is possible?

View this question

A hospital wants to share patient microdata while ensuring privacy. They apply noise addition to patient ages before releasing the data. What type of data protection method is this?

View this question

A hospital experiences a data breach where patient records are exposed. Which privacy law would apply in handling this breach?

View this question

Which one of the following enables more information on PI?

View this question

A hospital releases a de-identified dataset containing patient age, diagnosis, and city for public health research. However, a local newspaper cross-references it with publicly available obituary data and successfully re-identifies a few patients.

What type of disclosure risk does this case illustrate?

View this question

Want instant access to all verified answers on moovit.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!