exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 534 discussion

Actual exam question from CompTIA's CAS-004
Question #: 534
Topic #: 1
[All CAS-004 Questions]

An organization handles sensitive information that must be displayed on call center technicians’ screens to verify the identities of remote callers. The technicians use three randomly selected fields of information to complete the identity verification process. Some of the fields contain PII that are unique identifiers for the remote callers. Which of the following should be implemented to identify remote callers while also reducing the risk that technicians could improperly use the identification information?

  • A. Data masking
  • B. Encryption
  • C. Tokenization
  • D. Scrubbing
  • E. Substitution
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
2 weeks, 4 days ago
Selected Answer: A
I change my answer to A because to identify remote callers while also reducing the risk of improper use of sensitive information, A. Data masking is the best option. Data masking involves displaying only a partial or obfuscated version of sensitive information to users (such as technicians), while the full data remains protected. For example, if a technician needs to verify the identity of a remote caller using a unique identifier like a social security number or credit card number, data masking can ensure that only the relevant part of the information (e.g., the last four digits) is visible on the screen, while the rest of the information is hidden. This reduces the risk of misuse of sensitive data by limiting what technicians can see.
upvoted 1 times
...
nezeranonymous
2 months, 2 weeks ago
I believe it’s Data Masking for this one
upvoted 2 times
...
Pesos
2 months, 2 weeks ago
Think of calling for a medical appt or something govt related they asked for the last 4 of your social, not the whole thing... this is related to data masking, it helps verify you without giving all your information. Tokenization would generate an extensive randomized code
upvoted 1 times
...
c4521e0
2 months, 3 weeks ago
Selected Answer: A
Data masking involves obfuscating certain parts of sensitive data so that only the necessary portions of the information are visible to the users, while the rest is hidden. This allows call center technicians to verify remote callers using only the essential parts of the information without exposing the entire sensitive data (such as Personally Identifiable Information, or PII). For example, only part of a Social Security number or phone number may be shown, reducing the risk of misuse while still enabling identity verification.
upvoted 2 times
...
grelaman
3 months ago
Selected Answer: A
Data masking is the process of obscuring or hiding specific data elements within a dataset to protect sensitive information while preserving the data's usability for authorized purposes. It replaces sensitive data with masked values that are still functional for verification but do not reveal the actual sensitive information. By masking sensitive fields (e.g., Social Security numbers, account numbers), the organization can prevent technicians from seeing the full PII. Technicians can still verify identities using the partially masked data since enough information is available to match with the caller's responses. For example, displaying only the last four digits of an identification number. Why not Tokenization: Tokens do not carry meaningful information that technicians can use for identity verification. Tokenization is more suitable for payment process than the verification process described in the problem.
upvoted 2 times
...
Bright07
3 months, 1 week ago
Ans. C. To balance the need for identity verification with the risk of improper use of sensitive information, C. Tokenization is the best option. Tokenization replaces sensitive data with non-sensitive equivalents (tokens) that can be used for verification without exposing the actual data. This means technicians can verify identities without having direct access to sensitive information, thereby reducing the risk of misuse, while data masking obscures data, it can still be reversed or improperly accessed, which doesn't fully mitigate risks.
upvoted 1 times
...
HereToStudy
3 months, 2 weeks ago
Selected Answer: C
tokenization is commonly associated with payment processing, where sensitive credit card information is replaced with tokens. However, it can also be applied to other sensitive data, including PII, for secure identity verification. Data masking is often used in situations where data needs to be visible but with obfuscation to protect sensitive details. The choice between these methods depends on the specific use case and the level of security required. For identity verification without exposing PII, tokenization is generally more secure. Tokenization is more effective in providing unique identifiers that do not reveal any sensitive information, thereby minimizing potential misuse.
upvoted 2 times
...
ServerBrain
5 months, 1 week ago
Selected Answer: A
Data masking
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago