exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 309 discussion

Actual exam question from CompTIA's SY0-701
Question #: 309
Topic #: 1
[All SY0-701 Questions]

Which of the following is used to conceal credit card information in a database log file?

  • A. Tokenization
  • B. Masking
  • C. Hashing
  • D. Obfuscation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cri88
Highly Voted 7 months, 1 week ago
Selected Answer: B
B. Masking Masking is used to conceal sensitive information, such as credit card numbers, by replacing or hiding parts of the data. In the context of database log files, masking ensures that sensitive information is not exposed while maintaining the usability of the data for other purposes. Tokenization (A) replaces sensitive data with a token that can only be mapped back to the original data using a secure system, but it is not typically used for log file entries. Hashing (C) converts data into a fixed-length hash, but it's a one-way function, making it unsuitable if the original data needs to be retrieved. Obfuscation (D) refers to making data less understandable but is less structured and secure than masking for specific data like credit card numbers.
upvoted 8 times
...
VincentvdS
Most Recent 2 months, 2 weeks ago
Selected Answer: A
The answer is Tokenization. See also https://www.geeksforgeeks.org/difference-between-tokenization-and-masking/
upvoted 2 times
...
9149f41
2 months, 3 weeks ago
Selected Answer: B
In the question conceal word means hiding which is matching iwth Masking. Tokenization replaces the credit card number with random tokens, which is more about secure storage than concealing display in logs.
upvoted 1 times
...
jbmac
3 months, 3 weeks ago
Selected Answer: B
The correct answer is: B. Masking Explanation: Masking is used to conceal credit card information (or other sensitive data) in a way that makes the data partially visible but still useful for certain operations. For example, credit card numbers can be masked by showing only the last four digits, such as **** **** **** 1234. This allows the data to be used for display or processing without revealing the full, sensitive information.
upvoted 1 times
...
laternak26
4 months ago
Selected Answer: B
B. Masking Masking is the process of concealing certain parts of sensitive data, such as credit card information, by replacing part of the data with a non-sensitive placeholder or character. In the case of a credit card, this could involve showing only the last four digits (e.g., ****-****-****-1234) while hiding the rest of the number. Masking is commonly used when sensitive data needs to be logged or displayed but without revealing the full information. NOT A. Tokenization: Tokenization replaces sensitive data with a unique identifier, or "token," that has no meaningful value outside of the system that generated it. While tokenization is used for securing credit card data in transactions or storage, it does not specifically focus on concealing data in logs.
upvoted 1 times
...
0ca8ee9
4 months, 1 week ago
Selected Answer: A
To conceal credit card information in a database log file, the most commonly used method is tokenization; it replaces the actual credit card details with a random, meaningless token that can only be decrypted by the authorized system to retrieve the original information.
upvoted 2 times
...
Nadabull
4 months, 2 weeks ago
Selected Answer: A
To conceal credit card information in a database log file, the most commonly used method is tokenization; where the actual card details are replaced with a random, meaningless "token" that can only be decrypted by the authorized system to retrieve the original information when needed.
upvoted 1 times
...
AndyK2
4 months, 2 weeks ago
Selected Answer: B
From the Book: "Data masking partially redacts sensitive information by replacing some or all sensitive fields with blank characters. For example, we might replace all but the last four digits of a credit card number with Xs or *s to render the card number unreadable."
upvoted 1 times
...
famuza77
6 months, 1 week ago
Selected Answer: A
Its A, Tokenization replaces sensitive data, such as credit card numbers, with unique identification symbols (tokens) that retain all essential information without compromising security. These tokens can be stored in database logs instead of the actual credit card information, ensuring that sensitive data remains protected even if the logs are accessed.
upvoted 1 times
...
Cee007
7 months, 3 weeks ago
Selected Answer: B
B. Masking Masking involves altering the credit card information in such a way that it is not easily readable or identifiable while still retaining some format or structure for processing or display purposes. This is particularly useful for ensuring sensitive data is protected in log files or other records.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago