exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 429 discussion

Actual exam question from ISC's CCSP
Question #: 429
Topic #: 1
[All CCSP Questions]

Data masking can be used to provide all of the following functionality, except:

  • A. Secure remote access
  • B. test data in sandboxed environments
  • C. Authentication of privileged users
  • D. Enforcing least privilege
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
Data masking does not support authentication in any way. All the others are excellent use cases for data masking.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
drop_table
Highly Voted 3 years, 2 months ago
'A' should read "secure remote access of data", as in connecting to a resource from outside the protected network to read data which is then masked. "Secure Remote Access" is misleading in that it makes one think of VPNs and encryption.
upvoted 12 times
CL888
3 years, 1 month ago
That makes sense
upvoted 4 times
...
...
gjjw
Highly Voted 3 years, 4 months ago
How does data masking help secure remote access?
upvoted 7 times
...
MaciekMT
Most Recent 1 month, 3 weeks ago
Selected Answer: C
Data masking is primarily used to protect sensitive data by replacing it with obfuscated or anonymized values while maintaining its usability for testing, development, or security purposes. However, it does not play a role in authentication. 🔹 What Data Masking Can Do: A. Secure Remote Access → Helps ensure sensitive data is protected when accessed remotely. B. Test Data in Sandboxed Environments → Allows the use of realistic but anonymized data for testing without exposing actual sensitive information. D. Enforcing Least Privilege → Supports role-based access by restricting access to de-identified or masked data based on user permissions. 🔹 Why Not "Authentication of Privileged Users"? Authentication is the process of verifying a user’s identity (e.g., passwords, MFA, biometrics). Data masking does not verify user identity—it only hides or alters data visibility based on access policies.
upvoted 1 times
...
Pika26
4 months, 4 weeks ago
Selected Answer: C
C: Authentication of privileged users
upvoted 1 times
...
GregP
1 year, 3 months ago
it's pretty 'round about'. I guess yo ucan enforce least priv by not masking data to some people. and remote access by masking data from remote users. test data in sandbox is a given. so authentication is the best answer
upvoted 1 times
...
carls233
2 years ago
Based on the wording clearly A and C both fit the narrative of the question
upvoted 1 times
...
Banzaaai
2 years ago
answer A is correct
upvoted 1 times
...
Irivera
2 years, 9 months ago
data masking help secure remote access by not displaying password it does not take part in the actual authentication process
upvoted 2 times
...
kjjcraigskel
3 years ago
Arguably when you enter your password in certain sites the keystrokes are masked.. This is a very misleading question and an even more debatable answer.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago