exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 546 discussion

Actual exam question from CompTIA's SY0-601
Question #: 546
Topic #: 1
[All SY0-601 Questions]

An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to best satisfy both the CPO's and the development team's requirements?

  • A. Data purge
  • B. Data encryption
  • C. Data masking
  • D. Data tokenization
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
je123
Highly Voted 1 year, 8 months ago
Selected Answer: B
Just putting it out there that in professor's messer's practice exam, there is the following question where the answer is tokenisation and not data masking or data anonymisation that this forum has been advocating for this question and Q6. C15. Which of the following is the process for replacing sensitive data with a non-sensitive and functional placeholder? A. Minimization B. Tokenization C. Retention D. Masking In messer's answer, he explained as such: Tokenization replaces sensitive data with a token, and this token can be used as a functional placeholder for the original data. Data masking hides some of the original data to protect it from view. While hidden, this data cannot be used for any functional purpose.
upvoted 14 times
...
TreeeSon
Highly Voted 1 year, 7 months ago
Selected Answer: C
This is interesting as this is a question that's already presented in earlier questions of this collection. However, anonymization is presented in the older question; here it is not. Moreover, data masking is present in both. I'm going with C
upvoted 7 times
johnabayot
1 year, 3 months ago
Data Masking and Data tokenization is present in both
upvoted 5 times
...
...
Paula77
Most Recent 1 year, 1 month ago
Selected Answer: C
https://www.tonic.ai/guides/data-masking-vs-tokenization-finding-the-differences#:~:text=Data%20masking%20is%20used%20to,example%2C%20for%20use%20in%20analytics.
upvoted 1 times
...
maggie22
1 year, 3 months ago
Selected Answer: C
Data masking is the answer.
upvoted 3 times
...
EMP00000000
1 year, 5 months ago
Selected Answer: D
With tokenization, the data would be removed, satisfying the CPO. The data would be replaced with a functional token, allowing the team to conduct functionality tests. Masking the data does not remove it. The answer is D.
upvoted 4 times
Yomzie
1 year, 3 months ago
Did you say "Masking the data does not remove it?" No sir! Masking, essentially, is how your credit/debit card info is displayed (with asterisks) on receipts & invoices. With tokenization, a SSN of 123 456 789 would be displayed in a table as 490 371 504. So, to satisfy both the CPO and the Dev/Test team, Tokenization is the way to go.
upvoted 2 times
...
...
fryderyk
1 year, 6 months ago
I know AWS is not the source of truth for Comptia, but it's a trusted source anyway. Here tokenization is describes as one of the possible data masking techniques: https://aws.amazon.com/what-is/data-masking/ I'm not advocating for any answers. It's just worth to pose a question sometimes.
upvoted 1 times
...
[Removed]
1 year, 6 months ago
Selected Answer: C
Data masking... It simply ensures the efficient use of masked data for analysis without fear of leaking private information.
upvoted 2 times
...
JT4
1 year, 7 months ago
Selected Answer: C
Data masking refers to modifying data to hide the original content. The primary reason to do so is to protect sensitive information such as PII. The process retains usable data but converts it to inauthentic data. Get Certified Get Ahead SY0-601 Darril Gibson
upvoted 2 times
...
ja1092m
1 year, 8 months ago
Selected Answer: C
On second thought it might be data masking... https://www.k2view.com/blog/data-masking-vs-tokenization/#Which-One-Should-You-Choose
upvoted 2 times
...
ja1092m
1 year, 8 months ago
Selected Answer: B
https://www.geeksforgeeks.org/difference-between-tokenization-and-masking/ id go with tokenization
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 9 months ago
Selected Answer: C
Data masking, also known as data obfuscation or data anonymization, is a technique used to protect sensitive data by disguising original data with modified content. It allows the development team to perform functionality tests and search for specific data without exposing real sensitive information. Instead, the masked data presents a representation of the original data that does not reveal any sensitive details. By implementing data masking, the company can maintain data privacy and security while still enabling the development team to work with realistic data for testing and development purposes.
upvoted 4 times
...
Gamsje
1 year, 9 months ago
Selected Answer: C
Data purge * Remove a part of the data I choose C. Data masking
upvoted 1 times
...
mtnews
1 year, 10 months ago
Selected Answer: C
Similar to question #6. In this case the answer should be C. Data masking
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago