Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 24 discussion

Actual exam question from ISC's CCSP
Question #: 24
Topic #: 1
[All CCSP Questions]

What type of masking strategy involves making a separate and distinct copy of data with masking in place?

  • A. Dynamic
  • B. Replication
  • C. Static
  • D. Duplication
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
With static masking, a separate and distinct copy of the data set is created with masking in place. This is typically done through a script or other process that takes a standard data set, processes it to mask the appropriate and predefined fields, and then outputs the data set as a new one with the completed masking done.

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
glenpharmd
1 year, 1 month ago
Static Static Data Masking (SDM) involves creating a sanitized version of the data where sensitive information is obscured, replaced, or scrambled. This "masked" data resides in a separate and distinct copy, ensuring that the original data remains unchanged. The masked copy can then be used in environments where sensitive information should not be exposed, such as development or testing environments.
upvoted 2 times
TraceSplice
8 months, 1 week ago
As per AWS Static data masking is the process of applying a fixed set of masking rules to sensitive data before it’s stored or shared. It’s commonly used for data that does not change frequently or remains static over time. You predefine the rules and consistently apply them to the data, which ensures consistent masking across multiple environments.
upvoted 1 times
...
...
Pika26
1 year, 8 months ago
Selected Answer: C
Answer is C. Static.
upvoted 1 times
...
DA95
1 year, 11 months ago
The type of masking strategy that involves making a separate and distinct copy of data with masking in place is called duplication. In this approach, a copy of the data is created and the sensitive information is replaced with fake, but realistic, values. This copy of the data can then be used for testing, development, or other purposes without exposing the sensitive information.
upvoted 4 times
...
Mhiar
3 years, 8 months ago
correct
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...