ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 331 - SY0-701 discussion

Report
Export

In which of the following scenarios is tokenization the best privacy technique 10 use?

A.
Providing pseudo-anonymization tor social media user accounts
Answers
A.
Providing pseudo-anonymization tor social media user accounts
B.
Serving as a second factor for authentication requests
Answers
B.
Serving as a second factor for authentication requests
C.
Enabling established customers to safely store credit card Information
Answers
C.
Enabling established customers to safely store credit card Information
D.
Masking personal information inside databases by segmenting data
Answers
D.
Masking personal information inside databases by segmenting data
Suggested answer: C

Explanation:

Tokenization is a process that replaces sensitive data, such as credit card information, with a non-sensitive equivalent (token) that can be used in place of the actual data. This technique is particularly useful in securely storing payment information because the token can be safely stored and transmitted without exposing the original credit card number.

Reference =

CompTIA Security+ SY0-701 Course Content: Domain 03 Security Architecture.

CompTIA Security+ SY0-601 Study Guide: Chapter on Cryptography and Data Protection.

asked 02/10/2024
shvoal gerama
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first