List of questions
Related questions
Question 93 - 212-82 discussion
Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?
A.
Tokenization
B.
Masking
C.
Hashing
D.
Bucketing
Your answer:
0 comments
Sorted by
Leave a comment first