exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 302 discussion

Actual exam question from CompTIA's CS0-002
Question #: 302
Topic #: 1
[All CS0-002 Questions]

Which of the following techniques can be implemented to safeguard the confidentiality of sensitive information while allowing limited access to authorized individuals?

  • A. Deidentification
  • B. Hashing
  • C. Masking
  • D. Salting
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
2Fish
2 years, 1 month ago
Selected Answer: C
C. Looks to be correct. Maybe A if the question mentioned aggregating data for statistics. Data masking is a way to create a fake, but a realistic version of your organizational data. The goal is to protect sensitive data, while providing a functional alternative when real data is not needed—for example, in user training, sales demos, or software testing. Data masking processes change the values of the data while using the same format. The goal is to create a version that cannot be deciphered or reverse engineered. There are several ways to alter the data, including character shuffling, word or character substitution, and encryption.
upvoted 1 times
decrypt_taupe0l
1 year, 9 months ago
> while allowing limited access to authorized individuals How do we accomplish that with masked data?
upvoted 2 times
...
...
saspurstx21
2 years, 1 month ago
Deidentification seems to deal with personal info... the question just says sensitive information - C.
upvoted 1 times
...
gnnggnnggnng
2 years, 2 months ago
Selected Answer: C
Masking is a technique used to safeguard the confidentiality of sensitive information by obscuring parts of the data so that it is not completely visible to unauthorized individuals. Masking involves replacing sensitive information with fake data while still maintaining the appearance of the original information. This fake data can be anything from random characters to a fixed set of characters that do not represent the original information. The purpose of masking is to prevent unauthorized individuals from accessing sensitive information without compromising the data's utility for authorized users. This technique allows limited access to authorized individuals while protecting the confidentiality of sensitive information.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago