One approach suggested to ensure privacy is the small result rejection, in which the system rejects (returns no result from) any query, the result of which is derived from a small number, for example, five, of records. Show how to obtain sensitive data by using only queries derived from six records

What will be an ideal response?

There are many possible formulations for this answer. The principle of the answer should resemble extracting information about a single record by executing different queries that only have that single record in common among the results.

Computer Science & Information Technology

You might also like to view...

Formatting from one section of text can be applied efficiently to another section of text by using ________

A) copy and paste B) cut and paste C) selecting the original text and dragging it over the target text. D) the Format Painter

Computer Science & Information Technology

There are some specialized tools that allow an investigator to dig out certain types of files from unallocated space by identifying the header of that file type and copying all of the information between the head and a valid end of file marker. What is the name for this technique?

a. File imaging b. Data carving c. File reconciliation d. Magic number recovery

Computer Science & Information Technology