ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 93 - 212-82 discussion

Report
Export

Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).

Which of the following techniques was employed by Andre in the above scenario?

A.
Tokenization
Answers
A.
Tokenization
B.
Masking
Answers
B.
Masking
C.
Hashing
Answers
C.
Hashing
D.
Bucketing
Answers
D.
Bucketing
Suggested answer: B

Explanation:

Masking is the technique that Andre employed in the above scenario. Masking is a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#). Masking can help protect sensitive data from unauthorized access or disclosure, while preserving the format and structure of the original data . Tokenization is a deidentification technique that can replace the critical information in database fields with random tokens that have no meaning or relation to the original data. Hashing is a deidentification technique that can transform the critical information in database fields into fixed-length strings using a mathematical function. Bucketing is a deidentification technique that can group the critical information in database fields into ranges or categories based on certain criteria.

asked 18/09/2024
Sebastian Romero
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first