exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 126 discussion

Actual exam question from CompTIA's CAS-004
Question #: 126
Topic #: 1
[All CAS-004 Questions]

A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements:
✑ Be efficient at protecting the production environment
✑ Not require any change to the application
✑ Act at the presentation layer
Which of the following techniques should be used?

  • A. Masking
  • B. Tokenization
  • C. Algorithmic
  • D. Random substitution
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mr_BuCk3th34D
Highly Voted 1 year, 10 months ago
Selected Answer: A
Masking is a technique for obscuring sensitive data in a database by replacing it with fictitious data that has the same format and structure as the original data. Masking can be performed at the presentation layer, which means that it does not require any changes to the application itself. This makes it an efficient solution for protecting the production environment, as it can be easily implemented without disrupting the existing system. Tokenization is a technique for replacing sensitive data with a randomly generated value (a token) that has no intrinsic meaning and cannot be used to recreate the original data. Tokenization can be used to protect data at the presentation layer, but it typically requires changes to the application to store and retrieve the tokens.
upvoted 10 times
xped2
1 year, 2 months ago
Tokenization involves replacing sensitive data with randomly generated tokens, ensuring that the original data remains hidden. It is an effective technique for securing data without altering the application, and it can be applied at the presentation layer. Masking, on the other hand, typically involves partially concealing sensitive data, such as showing only the last four digits of a credit card number. While masking can be useful in certain scenarios, it may not meet the requirement of complete protection, and it often involves altering how data is displayed, which might affect the application's behavior.
upvoted 2 times
...
...
surfuganda
Highly Voted 6 months, 3 weeks ago
Selected Answer: B
A. Masking [x] efficient at protecting the production environment [ ] not require any change to the application [ ] act at the presentation layer B. Tokenization [x] efficient at protecting the production environment [x] not require any change to the application [x] act at the presentation layer C. Algorithmic [ ] efficient at protecting the production environment [x] not require any change to the application [x] act at the presentation layer D. Random substitution [x] efficient at protecting the production environment [ ] not require any change to the application [x] act at the presentation layer
upvoted 5 times
...
Chiaretta
Most Recent 3 months ago
Selected Answer: B
B. Tokenization [x] efficient at protecting the production environment [x] not require any change to the application [x] act at the presentation layer
upvoted 1 times
...
Meep123
1 year, 1 month ago
A. As both masking and tokenization seem to be close, tokenization does require a change to the application, specifically the database: "[Tokenization] normally creates surrogate value that can matched back to original string using database." and "this system looks up token value[s] in token [the] database and retrieve it." --https://www.geeksforgeeks.org/difference-between-tokenization-and-masking/
upvoted 3 times
...
AlenKumar
1 year, 10 months ago
To meet the requirements of hiding data stored in databases while being efficient at protecting the production environment, not requiring any change to the application, and acting at the presentation layer, the company should consider using data masking. Data masking is a technique that involves replacing sensitive data with fictitious data that resembles the original data, but is not real. It can be used to protect the production environment from unauthorized access to sensitive data while not requiring any changes to the application. Data masking acts at the presentation layer, which is the layer of the application that is responsible for presenting data to users, by hiding sensitive data from view.
upvoted 5 times
xped2
1 year, 2 months ago
While masking is another technique used to hide data, it typically involves partially hiding or obfuscating the data, which may not meet the requirement of complete protection. Algorithmic techniques may not fully meet the requirement of not requiring changes to the application, as they often involve encrypting or decrypting data within the application. Random substitution is not a recognized data protection technique in this context.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago