ISC2 Certified Secure Software Lifecycle Professional (CSSLP) Practice Question

Your team must share user activity logs with a third-party analytics vendor. To reduce privacy risk while still allowing regulators to trace events back to individuals if necessary, the security architect proposes pseudonymizing the user IDs. Which requirement below best satisfies the definition of pseudonymization in this context?

  • Mask each user ID by showing only the last four characters to the analytics vendor.

  • Encrypt the entire log file with AES-256 and keep the encryption key in the same cloud account as the data.

  • Hash each user ID with a random salt and permanently delete the salt before sharing the data set.

  • Replace each user ID with a random unique token and store the mapping table in an encrypted repository accessible only to a small, authorized team.

ISC2 Certified Secure Software Lifecycle Professional (CSSLP)
Secure Software Requirements
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot