ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 404 - SY0-601 discussion

Report
Export

An audit identified Pll being utilized in the development environment of a crit-ical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed: however, the developers are concerned that without real data they cannot perform functionality tests and search for specific dat a. Which of the following should a security professional implement to best satisfy both the CPOs and the development team's requirements?

A.
Data purge
Answers
A.
Data purge
B.
Data encryption
Answers
B.
Data encryption
C.
Data masking
Answers
C.
Data masking
D.
Data tokenization
Answers
D.
Data tokenization
Suggested answer: D

Explanation:

Data tokenization is a technique of replacing sensitive data with non-sensitive substitutes called tokens that have no intrinsic value or meaning. It can satisfy both the CPO's and the development team's requirements by removing personally identifiable information (PII) from the development environment of a critical application while preserving the functionality and format of the data for testing purposes.

asked 02/10/2024
Peter Avino
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first