<< Prev Question Next Question >>

Question 24/41

Scenario 8:MA store is an online clothing retailer founded in 2010. They provide quality products at a reasonable cost. One thing that differentiates MA store from other online shopping sites is their excellent customer service.
MA store follows a customer-centered business approach. They have created a user-friendly website with well-organized content that is accessible to everyone. Through innovative ideas and services, MA store offers a seamless user experience for visitors while also attracting new customers. When visiting the website, customers can filter their search results by price, size, customer reviews, and other features. One of MA store's strategies for providing, personalizing, and improving its products is data analytics. MA store tracks and analyzes the user actions on its website so it can create customized experience for visitors.
In order to understand their target audience, MA store analyzes shopping preferences of its customers based on their purchase history. The purchase history includes the product that was bought, shipping updates, and payment details. Clients' personal data and other information related to MA store products included in the purchase history are stored in separate databases. Personal information, such as clients' address or payment details, are encrypted using a public key. When analyzing the shopping preferences of customers, employees access only the information about the product while the identity of customers is removed from the data set and replaced with a common value, ensuring that customer identities are protected and cannot be retrieved.
Last year, MA store announced that they suffered a personal data breach where personal data of clients were leaked. The personal data breach was caused by an SQL injection attack which targeted MA store's web application. The SQL injection was successful since no parameterized queries were used.
Based on this scenario, answer the following question:
How could MA store prevent the SQL attack described in scenario 8?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (41q)
Question 1: Scenario5: Recpond is a German employment recruiting company...
Question 2: Scenario7: Scenario 7: EduCCS is an online education platfor...
Question 3: Question: According toArticle 82 of GDPR, when must aprocess...
Question 4: Scenario1: MED is a healthcare provider located in Norway. I...
Question 5: Scenario 7: EduCCS is an online education platform based in ...
Question 6: Scenario:2 Soyled is a retail company that sells a wide rang...
Question 7: Scenario 8:MA store is an online clothing retailer founded i...
Question 8: Question: All the statements below regarding thelawfulness o...
Question 9: Scenario:2 Soyled is a retail company that sells a wide rang...
Question 10: Scenario3: COR Bank is an international banking group that o...
Question 11: Scenario5: Recpond is a German employment recruiting company...
Question 12: Scenario 9:Soin is a French travel agency with the largest n...
Question 13: Scenario: Socianis a softwareused to collect medical records...
Question 14: When pseudonymization is used in a dataset, the data is divi...
Question 15: Question: Based onArticle 58 of GDPR, whatpowersmust thesupe...
Question 16: Scenario5: Recpond is a German employment recruiting company...
Question 17: Scenario1: MED is a healthcare provider located in Norway. I...
Question 18: Scenario: Aclinical research organizationcollects and proces...
Question 19: Scenario: PickFoodis an onlinefood delivery servicethat allo...
Question 20: Scenario 7: EduCCS is an online education platform based in ...
Question 21: Scenario4: Berc is a pharmaceutical company headquartered in...
Question 22: Scenario4: Berc is a pharmaceutical company headquartered in...
Question 23: Scenario3: COR Bank is an international banking group that o...
Question 24: Scenario 8:MA store is an online clothing retailer founded i...
Question 25: Question: UnderGDPR, the controller must demonstrate thatdat...
Question 26: Scenario: BookStis anonline bookshopthat collectspersonal da...
Question 27: An organization suffered a personal data breach. The attacke...
Question 28: Question: What is therole of the DPO in a DPIA?...
Question 29: Scenario: ChatBubbleis a software company that stores person...
Question 30: Scenario:2 Soyled is a retail company that sells a wide rang...
Question 31: Scenario3: COR Bank is an international banking group that o...
Question 32: Scenario4: Berc is a pharmaceutical company headquartered in...
Question 33: Question: What is themain purpose of conducting a DPIA?...
Question 34: Question: Which of the following options is theDPO's respons...
Question 35: Scenario 9:Soin is a French travel agency with the largest n...
Question 36: Question: What can beincludedin a DPIA?...
Question 37: Scenario4: Berc is a pharmaceutical company headquartered in...
Question 38: Scenario: A financial institution collectsbiometric data of ...
Question 39: Scenario 9:Soin is a French travel agency with the largest n...
Question 40: Question: You work in a company that providestraining servic...
Question 41: Scenario: An organization has been using astorage transfer s...