exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 309 discussion

Actual exam question from CompTIA's SY0-701
Question #: 309
Topic #: 1
[All SY0-701 Questions]

Which of the following is used to conceal credit card information in a database log file?

  • A. Tokenization
  • B. Masking
  • C. Hashing
  • D. Obfuscation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cri88
Highly Voted 2 months, 3 weeks ago
Selected Answer: B
B. Masking Masking is used to conceal sensitive information, such as credit card numbers, by replacing or hiding parts of the data. In the context of database log files, masking ensures that sensitive information is not exposed while maintaining the usability of the data for other purposes. Tokenization (A) replaces sensitive data with a token that can only be mapped back to the original data using a secure system, but it is not typically used for log file entries. Hashing (C) converts data into a fixed-length hash, but it's a one-way function, making it unsuitable if the original data needs to be retrieved. Obfuscation (D) refers to making data less understandable but is less structured and secure than masking for specific data like credit card numbers.
upvoted 6 times
...
Nadabull
Most Recent 23 hours, 8 minutes ago
Selected Answer: A
To conceal credit card information in a database log file, the most commonly used method is tokenization; where the actual card details are replaced with a random, meaningless "token" that can only be decrypted by the authorized system to retrieve the original information when needed.
upvoted 1 times
...
AndyK2
4 days, 23 hours ago
Selected Answer: B
From the Book: "Data masking partially redacts sensitive information by replacing some or all sensitive fields with blank characters. For example, we might replace all but the last four digits of a credit card number with Xs or *s to render the card number unreadable."
upvoted 1 times
...
famuza77
1 month, 3 weeks ago
Selected Answer: A
Its A, Tokenization replaces sensitive data, such as credit card numbers, with unique identification symbols (tokens) that retain all essential information without compromising security. These tokens can be stored in database logs instead of the actual credit card information, ensuring that sensitive data remains protected even if the logs are accessed.
upvoted 1 times
...
Cee007
3 months, 1 week ago
Selected Answer: B
B. Masking Masking involves altering the credit card information in such a way that it is not easily readable or identifiable while still retaining some format or structure for processing or display purposes. This is particularly useful for ensuring sensitive data is protected in log files or other records.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago