List of questions
Related questions
Question 404 - SY0-601 discussion
An audit identified Pll being utilized in the development environment of a crit-ical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed: however, the developers are concerned that without real data they cannot perform functionality tests and search for specific dat a. Which of the following should a security professional implement to best satisfy both the CPOs and the development team's requirements?
A.
Data purge
B.
Data encryption
C.
Data masking
D.
Data tokenization
Your answer:
0 comments
Sorted by
Leave a comment first