Data masking is primarily used to protect sensitive data by replacing or obfuscating real values while keeping the data usable for testing, development, and security purposes. However, data masking does not handle authentication—it only controls data visibility.
What Data Masking Can Do:
A. Test Data in Sandboxed Environments → Creates realistic but anonymized data for safe testing.
C. Enforcing Least Privilege → Ensures that users only see masked data based on their access level.
D. Secure Remote Access → Helps prevent data exposure in remote environments by masking sensitive information.
Why Not "Authentication of Privileged Users"?
Authentication verifies who a user is (e.g., passwords, biometrics, MFA).
Data masking does not verify identities; it only hides or alters data visibility.
The correct answer is D. Secure remote access. Data masking is primarily used for creating test data in sandboxed environments, authenticating privileged users, and enforcing least privilege, but it does not provide secure remote access
'D' should read "secure remote access of data", as in connecting to a resource from outside the protected network to read data which is then masked. "Secure Remote Access" is misleading in that it makes one think of VPNs and encryption.
upvoted 3 times
...
...
This section is not available anymore. Please use the main Exam Page.CCSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MaciekMT
1Â month, 3Â weeks agosweetykaur
6Â months, 1Â week agoCISSPCCSPMP
3Â years, 7Â months agogjjw
4Â years, 11Â months agosans1241
3Â years, 12Â months agoZeezee2
3Â years, 4Â months ago