Suggested Answer:A🗳️
We don't use DAM in place of encryption or masking; DAM augments these options without replacing them. We don't usually think of the database interaction as client-server, so A is the best answer.
Database Activity Monitoring (DAM) is a security technology used to track and analyze database access and activities to detect unauthorized or anomalous behavior. DAM can be implemented as:
Host-based DAM → Monitors database activity directly on the server using agents.
Network-based DAM → Monitors database traffic at the network level using network sniffing techniques.
Why Not the Others?
B. Server-based or client-based → DAM focuses on database monitoring, not distinguishing between server-side vs. client-side security.
C. Used in the place of encryption → Encryption protects data confidentiality, whereas DAM monitors database activity—they serve different purposes.
D. Used in place of data masking → Data masking hides sensitive data, while DAM detects and logs database interactions—they complement each other but are not interchangeable.
uhhhh....Database activity monitoring is done by combining several techniques such as network sniffing, memory scraping and reading system tables and database audit logs. So that means it can be network based or host based? why would it be masking?
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.CCSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MaciekMT
1Â month, 3Â weeks agoPika26
4Â months, 4Â weeks agoBanzaaai
2Â years agoBill_nye_russian_guy
1Â year, 10Â months ago