Session 8 Module D - Test Solutions¶
Security & Compliance - Answer Key¶
Question 1: Zero-Trust Security Principle¶
Correct Answer: B) Never trust, always verify every request regardless of source
Explanation: Zero-trust security architecture operates on the fundamental principle of "never trust, always verify." This means that every request, whether from internal or external sources, must be authenticated, authorized, and validated before access is granted. This approach eliminates the traditional network perimeter-based security model and treats every access attempt as potentially hostile.
Question 2: GDPR Right to Erasure Article¶
Correct Answer: C) Article 17 - Right to Erasure
Explanation: GDPR Article 17 specifically governs the "Right to Erasure" or "right to be forgotten," allowing data subjects to request deletion of their personal data under certain circumstances. The implementation includes legal feasibility assessment, comprehensive data removal, and third-party notification requirements as demonstrated in the compliance framework code.
Question 3: Differential Privacy Mechanism¶
Correct Answer: B) Calibrated mathematical noise using Laplace mechanism
Explanation: Differential privacy protects individual privacy by adding carefully calibrated mathematical noise to query results using mechanisms like Laplace noise. The noise scale is determined by the sensitivity of the query and the privacy budget (epsilon), providing formal mathematical guarantees about privacy protection while maintaining statistical utility.
Question 4: High-Risk Threat Response Actions¶
Correct Answer: C) block_temporarily, alert_security_team
Explanation: According to the threat detection system configuration, high-risk threats trigger response actions including temporary blocking of the threat source and alerting the security team. This balanced approach prevents immediate damage while allowing human expertise to assess and respond appropriately, avoiding the more severe permanent blocking reserved for critical threats.
Question 5: K-Anonymity Privacy Technique¶
Correct Answer: C) Generalization and suppression of quasi-identifiers
Explanation: K-anonymity is achieved through generalization (replacing specific values with broader categories) and suppression (removing identifying information) of quasi-identifiers. The anonymization process includes age group generalization, location region mapping, and direct identifier removal or pseudonymization to ensure each record is indistinguishable from at least k-1 other records.
Key Concepts Summary¶
Zero-Trust Security Architecture¶
- Authentication verification for every request regardless of source or location
- Multi-factor authentication with comprehensive credential validation
- Session management with secure token generation and timeout controls
Compliance Framework Implementation¶
- GDPR compliance with automated data subject request processing
- HIPAA safeguards for healthcare information protection
- SOC2 controls for service organization security and availability
Privacy Protection Techniques¶
- Differential privacy provides mathematical privacy guarantees through noise addition
- K-anonymity protects against re-identification through generalization and suppression
- Data retention policies ensure automated compliance with regulatory timelines
Threat Detection and Response¶
- Multi-vector analysis including brute force, prompt injection, and behavioral anomalies
- Risk-based response with escalating actions from monitoring to emergency procedures
- Audit trail management with tamper-evident logging and integrity protection
Enterprise Security Integration¶
- Encryption frameworks for data at rest and in transit protection
- Compliance reporting with automated violation detection and remediation guidance
- Privacy-by-design implementation with comprehensive data lifecycle management