exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 30 discussion

Actual exam question from ECCouncil's 212-82
Question #: 30
Topic #: 1
[All 212-82 Questions]

Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?

  • A. Tokenization
  • B. Masking
  • C. Hashing
  • D. Bucketing
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
1 month, 3 weeks ago
Selected Answer: B
EC-Council Official Curricula Certified Cybersecurity Technician v1 https://online.vitalsource.com/reader/books/9781635679533/ Module 15 Page 1759 Data Masking Protecting information by obscuring specific areas of data with random characters or codes. Data masking protects sensitive data such as personally identifiable information, protected health information, payment card information, intellectual property, etc. Apart from this, data masking also protects against an insider threat. Implementing data masking will bolster the security strategies of an organization.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago