exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 781 discussion

Actual exam question from CompTIA's SY0-601
Question #: 781
Topic #: 1
[All SY0-601 Questions]

A web application for a bank displays the following output when showing details about a customer's bank account:



Which of the following techniques is most likely implemented in this web application?

  • A. Data minimization
  • B. Data scrambling
  • C. Data masking
  • D. Anonymization
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DJ305
Highly Voted 1 year, 3 months ago
Selected Answer: C
bro's a millionaire
upvoted 10 times
DJ305
1 year, 3 months ago
when you see ***** mainly on a bank account, think always about Data Masking
upvoted 1 times
...
...
russian
Most Recent 1 year, 2 months ago
Selected Answer: C
masking is using * to cover up sensitive data
upvoted 1 times
...
tnar140
1 year, 2 months ago
Selected Answer: C
Using asterisks (*) to replace sensitive data, such as personal identification numbers or credit card numbers, is a common masking technique.
upvoted 3 times
...
Imjusthere00
1 year, 3 months ago
Selected Answer: C
Data Masking
upvoted 1 times
...
klinkklonk
1 year, 4 months ago
Selected Answer: C
DATA MASKING Like when something asks you to verify your car ****1234 they mask part of the info.
upvoted 2 times
...
Baba111222
1 year, 5 months ago
Selected Answer: D
It has to be Anonymization, look at the "*" ;) Data making would change the whole string to something else, but within the same context like John Doe to Mark Smith, while anonymization replaces value characters with f.ex.: "*" og "x", changing John Doe to J*** *** or Jxxx xxx.
upvoted 3 times
Yomzie
1 year, 5 months ago
You literary mixed it up. Masking replaces actual letters with asterisk (e.g. John Smith Doe becomes J*** S**** D**). Data Anonymization totally removes PII from data sets, so the subject of the data remains anonymous (e.g. John Smith Doe, in a record, would be replaced with something totally unrelated, like Buster Crow Applegate).
upvoted 8 times
...
...
RedDog2
1 year, 5 months ago
Selected Answer: C
Data masking is a way to create a fake, but a realistic version of your organizational data. The goal is to protect sensitive data, while providing a functional alternative when real data is not needed—for example, in user training, sales demos, or software testing.
upvoted 3 times
...
Hs1208
1 year, 5 months ago
Selected Answer: C
C. Data Masking
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...